Oracle Cloud Infrastructure v2.33.0 published on Thursday, May 1, 2025 by Pulumi
oci.Core.getNetworkSecurityGroupSecurityRules
Explore with Pulumi AI
This data source provides the list of Network Security Group Security Rules in Oracle Cloud Infrastructure Core service.
Lists the security rules in the specified network security group.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkSecurityGroupSecurityRules = oci.Core.getNetworkSecurityGroupSecurityRules({
    networkSecurityGroupId: testNetworkSecurityGroup.id,
    direction: networkSecurityGroupSecurityRuleDirection,
});
import pulumi
import pulumi_oci as oci
test_network_security_group_security_rules = oci.Core.get_network_security_group_security_rules(network_security_group_id=test_network_security_group["id"],
    direction=network_security_group_security_rule_direction)
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/core"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := core.GetNetworkSecurityGroupSecurityRules(ctx, &core.GetNetworkSecurityGroupSecurityRulesArgs{
			NetworkSecurityGroupId: testNetworkSecurityGroup.Id,
			Direction:              pulumi.StringRef(networkSecurityGroupSecurityRuleDirection),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testNetworkSecurityGroupSecurityRules = Oci.Core.GetNetworkSecurityGroupSecurityRules.Invoke(new()
    {
        NetworkSecurityGroupId = testNetworkSecurityGroup.Id,
        Direction = networkSecurityGroupSecurityRuleDirection,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Core.CoreFunctions;
import com.pulumi.oci.Core.inputs.GetNetworkSecurityGroupSecurityRulesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testNetworkSecurityGroupSecurityRules = CoreFunctions.getNetworkSecurityGroupSecurityRules(GetNetworkSecurityGroupSecurityRulesArgs.builder()
            .networkSecurityGroupId(testNetworkSecurityGroup.id())
            .direction(networkSecurityGroupSecurityRuleDirection)
            .build());
    }
}
variables:
  testNetworkSecurityGroupSecurityRules:
    fn::invoke:
      function: oci:Core:getNetworkSecurityGroupSecurityRules
      arguments:
        networkSecurityGroupId: ${testNetworkSecurityGroup.id}
        direction: ${networkSecurityGroupSecurityRuleDirection}
Using getNetworkSecurityGroupSecurityRules
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getNetworkSecurityGroupSecurityRules(args: GetNetworkSecurityGroupSecurityRulesArgs, opts?: InvokeOptions): Promise<GetNetworkSecurityGroupSecurityRulesResult>
function getNetworkSecurityGroupSecurityRulesOutput(args: GetNetworkSecurityGroupSecurityRulesOutputArgs, opts?: InvokeOptions): Output<GetNetworkSecurityGroupSecurityRulesResult>def get_network_security_group_security_rules(direction: Optional[str] = None,
                                              filters: Optional[Sequence[GetNetworkSecurityGroupSecurityRulesFilter]] = None,
                                              network_security_group_id: Optional[str] = None,
                                              opts: Optional[InvokeOptions] = None) -> GetNetworkSecurityGroupSecurityRulesResult
def get_network_security_group_security_rules_output(direction: Optional[pulumi.Input[str]] = None,
                                              filters: Optional[pulumi.Input[Sequence[pulumi.Input[GetNetworkSecurityGroupSecurityRulesFilterArgs]]]] = None,
                                              network_security_group_id: Optional[pulumi.Input[str]] = None,
                                              opts: Optional[InvokeOptions] = None) -> Output[GetNetworkSecurityGroupSecurityRulesResult]func GetNetworkSecurityGroupSecurityRules(ctx *Context, args *GetNetworkSecurityGroupSecurityRulesArgs, opts ...InvokeOption) (*GetNetworkSecurityGroupSecurityRulesResult, error)
func GetNetworkSecurityGroupSecurityRulesOutput(ctx *Context, args *GetNetworkSecurityGroupSecurityRulesOutputArgs, opts ...InvokeOption) GetNetworkSecurityGroupSecurityRulesResultOutput> Note: This function is named GetNetworkSecurityGroupSecurityRules in the Go SDK.
public static class GetNetworkSecurityGroupSecurityRules 
{
    public static Task<GetNetworkSecurityGroupSecurityRulesResult> InvokeAsync(GetNetworkSecurityGroupSecurityRulesArgs args, InvokeOptions? opts = null)
    public static Output<GetNetworkSecurityGroupSecurityRulesResult> Invoke(GetNetworkSecurityGroupSecurityRulesInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetNetworkSecurityGroupSecurityRulesResult> getNetworkSecurityGroupSecurityRules(GetNetworkSecurityGroupSecurityRulesArgs args, InvokeOptions options)
public static Output<GetNetworkSecurityGroupSecurityRulesResult> getNetworkSecurityGroupSecurityRules(GetNetworkSecurityGroupSecurityRulesArgs args, InvokeOptions options)
fn::invoke:
  function: oci:Core/getNetworkSecurityGroupSecurityRules:getNetworkSecurityGroupSecurityRules
  arguments:
    # arguments dictionaryThe following arguments are supported:
- NetworkSecurity stringGroup Id 
- The OCID of the network security group.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- Filters
List<GetNetwork Security Group Security Rules Filter> 
- NetworkSecurity stringGroup Id 
- The OCID of the network security group.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- Filters
[]GetNetwork Security Group Security Rules Filter 
- networkSecurity StringGroup Id 
- The OCID of the network security group.
- direction String
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- filters
List<GetNetwork Security Group Security Rules Filter> 
- networkSecurity stringGroup Id 
- The OCID of the network security group.
- direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- filters
GetNetwork Security Group Security Rules Filter[] 
- network_security_ strgroup_ id 
- The OCID of the network security group.
- direction str
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- filters
Sequence[GetNetwork Security Group Security Rules Filter] 
- networkSecurity StringGroup Id 
- The OCID of the network security group.
- direction String
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- filters List<Property Map>
getNetworkSecurityGroupSecurityRules Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- NetworkSecurity stringGroup Id 
- SecurityRules List<GetNetwork Security Group Security Rules Security Rule> 
- The list of security_rules.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- Filters
List<GetNetwork Security Group Security Rules Filter> 
- Id string
- The provider-assigned unique ID for this managed resource.
- NetworkSecurity stringGroup Id 
- SecurityRules []GetNetwork Security Group Security Rules Security Rule 
- The list of security_rules.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- Filters
[]GetNetwork Security Group Security Rules Filter 
- id String
- The provider-assigned unique ID for this managed resource.
- networkSecurity StringGroup Id 
- securityRules List<GetNetwork Security Group Security Rules Security Rule> 
- The list of security_rules.
- direction String
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- filters
List<GetNetwork Security Group Security Rules Filter> 
- id string
- The provider-assigned unique ID for this managed resource.
- networkSecurity stringGroup Id 
- securityRules GetNetwork Security Group Security Rules Security Rule[] 
- The list of security_rules.
- direction string
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- filters
GetNetwork Security Group Security Rules Filter[] 
- id str
- The provider-assigned unique ID for this managed resource.
- network_security_ strgroup_ id 
- security_rules Sequence[GetNetwork Security Group Security Rules Security Rule] 
- The list of security_rules.
- direction str
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- filters
Sequence[GetNetwork Security Group Security Rules Filter] 
- id String
- The provider-assigned unique ID for this managed resource.
- networkSecurity StringGroup Id 
- securityRules List<Property Map>
- The list of security_rules.
- direction String
- Direction of the security rule. Set to EGRESSfor rules to allow outbound IP packets, orINGRESSfor rules to allow inbound IP packets.
- filters List<Property Map>
Supporting Types
GetNetworkSecurityGroupSecurityRulesFilter      
GetNetworkSecurityGroupSecurityRulesSecurityRule       
- Description string
- An optional description of your choice for the rule.
- Destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- DestinationType string
- Type of destination for the rule. Required if direction=EGRESS.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- IcmpOptions List<GetNetwork Security Group Security Rules Security Rule Icmp Option> 
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- Id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- IsValid bool
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- Protocol string
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- SourceType string
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- Stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions List<GetNetwork Security Group Security Rules Security Rule Tcp Option> 
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- TimeCreated string
- The date and time the security rule was created. Format defined by RFC3339.
- UdpOptions List<GetNetwork Security Group Security Rules Security Rule Udp Option> 
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Description string
- An optional description of your choice for the rule.
- Destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- DestinationType string
- Type of destination for the rule. Required if direction=EGRESS.
- Direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- IcmpOptions []GetNetwork Security Group Security Rules Security Rule Icmp Option 
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- Id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- IsValid bool
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- Protocol string
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- SourceType string
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- Stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions []GetNetwork Security Group Security Rules Security Rule Tcp Option 
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- TimeCreated string
- The date and time the security rule was created. Format defined by RFC3339.
- UdpOptions []GetNetwork Security Group Security Rules Security Rule Udp Option 
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description String
- An optional description of your choice for the rule.
- destination String
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destinationType String
- Type of destination for the rule. Required if direction=EGRESS.
- direction String
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- icmpOptions List<GetNetwork Security Group Security Rules Security Rule Icmp Option> 
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id String
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- isValid Boolean
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- protocol String
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source String
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- sourceType String
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- stateless Boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions List<GetNetwork Security Group Security Rules Security Rule Tcp Option> 
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- timeCreated String
- The date and time the security rule was created. Format defined by RFC3339.
- udpOptions List<GetNetwork Security Group Security Rules Security Rule Udp Option> 
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description string
- An optional description of your choice for the rule.
- destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destinationType string
- Type of destination for the rule. Required if direction=EGRESS.
- direction string
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- icmpOptions GetNetwork Security Group Security Rules Security Rule Icmp Option[] 
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- isValid boolean
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- protocol string
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- sourceType string
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- stateless boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions GetNetwork Security Group Security Rules Security Rule Tcp Option[] 
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- timeCreated string
- The date and time the security rule was created. Format defined by RFC3339.
- udpOptions GetNetwork Security Group Security Rules Security Rule Udp Option[] 
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description str
- An optional description of your choice for the rule.
- destination str
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destination_type str
- Type of destination for the rule. Required if direction=EGRESS.
- direction str
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- icmp_options Sequence[GetNetwork Security Group Security Rules Security Rule Icmp Option] 
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id str
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- is_valid bool
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- protocol str
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source str
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- source_type str
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_options Sequence[GetNetwork Security Group Security Rules Security Rule Tcp Option] 
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- time_created str
- The date and time the security rule was created. Format defined by RFC3339.
- udp_options Sequence[GetNetwork Security Group Security Rules Security Rule Udp Option] 
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description String
- An optional description of your choice for the rule.
- destination String
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destinationType String
- Type of destination for the rule. Required if direction=EGRESS.
- direction String
- Direction of the security rule. Set to EGRESSfor rules that allow outbound IP packets, orINGRESSfor rules that allow inbound IP packets.
- icmpOptions List<Property Map>
- Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id String
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example: 04ABEC
- isValid Boolean
- Whether the rule is valid. The value is Truewhen the rule is first created. If the rule'ssourceordestinationis a network security group, the value changes toFalseif that network security group is deleted.
- protocol String
- The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source String
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- sourceType String
- Type of source for the rule. Required if direction=INGRESS.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
- NETWORK_SECURITY_GROUP: If the rule's- sourceis the OCID of a NetworkSecurityGroup.
 
- stateless Boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions List<Property Map>
- Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- timeCreated String
- The date and time the security rule was created. Format defined by RFC3339.
- udpOptions List<Property Map>
- Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
GetNetworkSecurityGroupSecurityRulesSecurityRuleIcmpOption         
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOption         
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOptionDestinationPortRange            
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOptionSourcePortRange            
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOption         
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOptionDestinationPortRange            
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOptionSourcePortRange            
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.