Zscaler Internet Access v1.0.1 published on Friday, Jun 6, 2025 by Zscaler
zia.getFirewallDnsRule
Explore with Pulumi AI
Deprecated: zia.index/getfirewalldnsrule.getFirewallDnsRule has been deprecated in favor of zia.index/getfirewalldnsrules.getFirewallDNSRules
Use the zia_firewall_dns_rule data source to get information about a cloud firewall DNS rule available in the Zscaler Internet Access.
Example Usage
# ZIA Firewall DNS Rule by name
data "zia_firewall_dns_rule" "this" {
name = "Default Cloud IPS Rule"
}
# ZIA Firewall DNS Rule by ID
data "zia_firewall_dns_rule" "this" {
id = "12365478"
}
Using getFirewallDnsRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getFirewallDnsRule(args: GetFirewallDnsRuleArgs, opts?: InvokeOptions): Promise<GetFirewallDnsRuleResult>
function getFirewallDnsRuleOutput(args: GetFirewallDnsRuleOutputArgs, opts?: InvokeOptions): Output<GetFirewallDnsRuleResult>
def get_firewall_dns_rule(id: Optional[int] = None,
name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetFirewallDnsRuleResult
def get_firewall_dns_rule_output(id: Optional[pulumi.Input[int]] = None,
name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetFirewallDnsRuleResult]
func GetFirewallDnsRule(ctx *Context, args *GetFirewallDnsRuleArgs, opts ...InvokeOption) (*GetFirewallDnsRuleResult, error)
func GetFirewallDnsRuleOutput(ctx *Context, args *GetFirewallDnsRuleOutputArgs, opts ...InvokeOption) GetFirewallDnsRuleResultOutput
> Note: This function is named GetFirewallDnsRule
in the Go SDK.
public static class GetFirewallDnsRule
{
public static Task<GetFirewallDnsRuleResult> InvokeAsync(GetFirewallDnsRuleArgs args, InvokeOptions? opts = null)
public static Output<GetFirewallDnsRuleResult> Invoke(GetFirewallDnsRuleInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetFirewallDnsRuleResult> getFirewallDnsRule(GetFirewallDnsRuleArgs args, InvokeOptions options)
public static Output<GetFirewallDnsRuleResult> getFirewallDnsRule(GetFirewallDnsRuleArgs args, InvokeOptions options)
fn::invoke:
function: zia:index/getFirewallDnsRule:getFirewallDnsRule
arguments:
# arguments dictionary
The following arguments are supported:
getFirewallDnsRule Result
The following output properties are available:
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Application Group> - (List of Objects) DNS application groups to which the rule applies
- Applications List<string>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Department> - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses List<string> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries List<string> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip List<string>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip List<zscaler.Groups Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Dest Ip Group> - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Dest Ipv6Group> - Device
Groups List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Device Group> - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Device> - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Rule List<string>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Groups
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Group> - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Id int
- (Integer) Identifier that uniquely identifies an entity
- Labels
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Label> - (List of Objects) Labels that are applicable to the rule.
- Last
Modified List<zscaler.Bies Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Last Modified By> - Last
Modified intTime - Location
Groups List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Location Group> - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Location> - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- (string) The configured name of the entity
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols List<string>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories List<string> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Source
Countries List<string> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip List<zscaler.Groups Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Src Ip Group> - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips List<string> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Src Ipv6Group> - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows List<zscaler.Pulumi Package. Zia. Outputs. Get Firewall Dns Rule Time Window> - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
List<zscaler.
Pulumi Package. Zia. Outputs. Get Firewall Dns Rule User> - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups []GetFirewall Dns Rule Application Group - (List of Objects) DNS application groups to which the rule applies
- Applications []string
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
[]Get
Firewall Dns Rule Department - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses []string - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries []string - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip []stringCategories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip []GetGroups Firewall Dns Rule Dest Ip Group - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups []GetFirewall Dns Rule Dest Ipv6Group - Device
Groups []GetFirewall Dns Rule Device Group - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
[]Get
Firewall Dns Rule Device - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Rule []stringRequest Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Groups
[]Get
Firewall Dns Rule Group - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Id int
- (Integer) Identifier that uniquely identifies an entity
- Labels
[]Get
Firewall Dns Rule Label - (List of Objects) Labels that are applicable to the rule.
- Last
Modified []GetBies Firewall Dns Rule Last Modified By - Last
Modified intTime - Location
Groups []GetFirewall Dns Rule Location Group - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
[]Get
Firewall Dns Rule Location - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- (string) The configured name of the entity
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols []string
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories []string - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Source
Countries []string - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip []GetGroups Firewall Dns Rule Src Ip Group - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips []string - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups []GetFirewall Dns Rule Src Ipv6Group - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows []GetFirewall Dns Rule Time Window - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
[]Get
Firewall Dns Rule User - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups List<GetFirewall Dns Rule Application Group> - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
List<Get
Firewall Dns Rule Department> - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip List<GetGroups Firewall Dns Rule Dest Ip Group> - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups List<GetFirewall Dns Rule Dest Ipv6Group> - device
Groups List<GetFirewall Dns Rule Device Group> - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
List<Get
Firewall Dns Rule Device> - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - groups
List<Get
Firewall Dns Rule Group> - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - id Integer
- (Integer) Identifier that uniquely identifies an entity
- labels
List<Get
Firewall Dns Rule Label> - (List of Objects) Labels that are applicable to the rule.
- last
Modified List<GetBies Firewall Dns Rule Last Modified By> - last
Modified IntegerTime - location
Groups List<GetFirewall Dns Rule Location Group> - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
List<Get
Firewall Dns Rule Location> - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- (string) The configured name of the entity
- order Integer
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Integer
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip List<GetGroups Firewall Dns Rule Src Ip Group> - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups List<GetFirewall Dns Rule Src Ipv6Group> - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows List<GetFirewall Dns Rule Time Window> - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
List<Get
Firewall Dns Rule User> - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups GetFirewall Dns Rule Application Group[] - (List of Objects) DNS application groups to which the rule applies
- applications string[]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Get
Firewall Dns Rule Department[] - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses string[] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries string[] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip string[]Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip GetGroups Firewall Dns Rule Dest Ip Group[] - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups GetFirewall Dns Rule Dest Ipv6Group[] - device
Groups GetFirewall Dns Rule Device Group[] - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Get
Firewall Dns Rule Device[] - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Rule string[]Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - groups
Get
Firewall Dns Rule Group[] - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - id number
- (Integer) Identifier that uniquely identifies an entity
- labels
Get
Firewall Dns Rule Label[] - (List of Objects) Labels that are applicable to the rule.
- last
Modified GetBies Firewall Dns Rule Last Modified By[] - last
Modified numberTime - location
Groups GetFirewall Dns Rule Location Group[] - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Get
Firewall Dns Rule Location[] - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name string
- (string) The configured name of the entity
- order number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols string[]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories string[] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries string[] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip GetGroups Firewall Dns Rule Src Ip Group[] - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips string[] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups GetFirewall Dns Rule Src Ipv6Group[] - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows GetFirewall Dns Rule Time Window[] - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Get
Firewall Dns Rule User[] - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- action str
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application_
groups Sequence[GetFirewall Dns Rule Application Group] - (List of Objects) DNS application groups to which the rule applies
- applications Sequence[str]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block_
response_ strcode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture_
pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default_
rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Sequence[Get
Firewall Dns Rule Department] - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description str
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
addresses Sequence[str] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest_
countries Sequence[str] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest_
ip_ Sequence[str]categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Sequence[Getgroups Firewall Dns Rule Dest Ip Group] - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest_
ipv6_ Sequence[Getgroups Firewall Dns Rule Dest Ipv6Group] - device_
groups Sequence[GetFirewall Dns Rule Device Group] - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Sequence[Get
Firewall Dns Rule Device] - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns_
rule_ Sequence[str]request_ types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - groups
Sequence[Get
Firewall Dns Rule Group] - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - id int
- (Integer) Identifier that uniquely identifies an entity
- labels
Sequence[Get
Firewall Dns Rule Label] - (List of Objects) Labels that are applicable to the rule.
- last_
modified_ Sequence[Getbies Firewall Dns Rule Last Modified By] - last_
modified_ inttime - location_
groups Sequence[GetFirewall Dns Rule Location Group] - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Sequence[Get
Firewall Dns Rule Location] - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name str
- (string) The configured name of the entity
- order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols Sequence[str]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect_
ip str - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res_
categories Sequence[str] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source_
countries Sequence[str] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src_
ip_ Sequence[Getgroups Firewall Dns Rule Src Ip Group] - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src_
ips Sequence[str] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src_
ipv6_ Sequence[Getgroups Firewall Dns Rule Src Ipv6Group] - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state str
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time_
windows Sequence[GetFirewall Dns Rule Time Window] - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Sequence[Get
Firewall Dns Rule User] - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups List<Property Map> - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments List<Property Map>
- (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip List<Property Map>Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups List<Property Map> - device
Groups List<Property Map> - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices List<Property Map>
- (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - groups List<Property Map>
- (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - id Number
- (Integer) Identifier that uniquely identifies an entity
- labels List<Property Map>
- (List of Objects) Labels that are applicable to the rule.
- last
Modified List<Property Map>Bies - last
Modified NumberTime - location
Groups List<Property Map> - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations List<Property Map>
- (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- (string) The configured name of the entity
- order Number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip List<Property Map>Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups List<Property Map> - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows List<Property Map> - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users List<Property Map>
- (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
Supporting Types
GetFirewallDnsRuleApplicationGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleDepartment
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleDestIpGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleDestIpv6Group
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleDevice
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleDeviceGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleLabel
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleLastModifiedBy
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleLocation
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleLocationGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleSrcIpGroup
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleSrcIpv6Group
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleTimeWindow
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
GetFirewallDnsRuleUser
- Extensions Dictionary<string, string>
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- Extensions map[string]string
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Name string
- Name of the Firewall Filtering policy rule
- extensions Map<String,String>
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
- id number
- Unique identifier for the Firewall Filtering policy rule
- name string
- Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
- id int
- Unique identifier for the Firewall Filtering policy rule
- name str
- Name of the Firewall Filtering policy rule
- extensions Map<String>
- id Number
- Unique identifier for the Firewall Filtering policy rule
- name String
- Name of the Firewall Filtering policy rule
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.