oci.Core.SecurityList
Explore with Pulumi AI
This resource provides the Security List resource in Oracle Cloud Infrastructure Core service.
Creates a new security list for the specified VCN. For more information about security lists, see Security Lists. For information on the number of rules you can have in a security list, see Service Limits.
For the purposes of access control, you must provide the OCID of the compartment where you want the security list to reside. Notice that the security list doesn’t have to be in the same compartment as the VCN, subnets, or other Networking Service components. If you’re not sure which compartment to use, put the security list in the same compartment as the VCN. For more information about compartments and access control, see Overview of the IAM Service. For information about OCIDs, see Resource Identifiers.
You may optionally specify a display name for the security list, otherwise a default is provided. It does not have to be unique, and you can change it. Avoid entering confidential information.
For more information on configuring a VCN’s default security list, see Managing Default VCN Resources
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecurityList = new oci.core.SecurityList("test_security_list", {
    compartmentId: compartmentId,
    vcnId: testVcn.id,
    definedTags: {
        "Operations.CostCenter": "42",
    },
    displayName: securityListDisplayName,
    egressSecurityRules: [{
        destination: securityListEgressSecurityRulesDestination,
        protocol: securityListEgressSecurityRulesProtocol,
        description: securityListEgressSecurityRulesDescription,
        destinationType: securityListEgressSecurityRulesDestinationType,
        icmpOptions: {
            type: securityListEgressSecurityRulesIcmpOptionsType,
            code: securityListEgressSecurityRulesIcmpOptionsCode,
        },
        stateless: securityListEgressSecurityRulesStateless,
        tcpOptions: {
            max: securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax,
            min: securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin,
            sourcePortRange: {
                max: securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax,
                min: securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin,
            },
        },
        udpOptions: {
            max: securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax,
            min: securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin,
            sourcePortRange: {
                max: securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax,
                min: securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin,
            },
        },
    }],
    freeformTags: {
        Department: "Finance",
    },
    ingressSecurityRules: [{
        protocol: securityListIngressSecurityRulesProtocol,
        source: securityListIngressSecurityRulesSource,
        description: securityListIngressSecurityRulesDescription,
        icmpOptions: {
            type: securityListIngressSecurityRulesIcmpOptionsType,
            code: securityListIngressSecurityRulesIcmpOptionsCode,
        },
        sourceType: securityListIngressSecurityRulesSourceType,
        stateless: securityListIngressSecurityRulesStateless,
        tcpOptions: {
            max: securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax,
            min: securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin,
            sourcePortRange: {
                max: securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax,
                min: securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin,
            },
        },
        udpOptions: {
            max: securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax,
            min: securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin,
            sourcePortRange: {
                max: securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax,
                min: securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin,
            },
        },
    }],
});
import pulumi
import pulumi_oci as oci
test_security_list = oci.core.SecurityList("test_security_list",
    compartment_id=compartment_id,
    vcn_id=test_vcn["id"],
    defined_tags={
        "Operations.CostCenter": "42",
    },
    display_name=security_list_display_name,
    egress_security_rules=[{
        "destination": security_list_egress_security_rules_destination,
        "protocol": security_list_egress_security_rules_protocol,
        "description": security_list_egress_security_rules_description,
        "destination_type": security_list_egress_security_rules_destination_type,
        "icmp_options": {
            "type": security_list_egress_security_rules_icmp_options_type,
            "code": security_list_egress_security_rules_icmp_options_code,
        },
        "stateless": security_list_egress_security_rules_stateless,
        "tcp_options": {
            "max": security_list_egress_security_rules_tcp_options_destination_port_range_max,
            "min": security_list_egress_security_rules_tcp_options_destination_port_range_min,
            "source_port_range": {
                "max": security_list_egress_security_rules_tcp_options_source_port_range_max,
                "min": security_list_egress_security_rules_tcp_options_source_port_range_min,
            },
        },
        "udp_options": {
            "max": security_list_egress_security_rules_udp_options_destination_port_range_max,
            "min": security_list_egress_security_rules_udp_options_destination_port_range_min,
            "source_port_range": {
                "max": security_list_egress_security_rules_udp_options_source_port_range_max,
                "min": security_list_egress_security_rules_udp_options_source_port_range_min,
            },
        },
    }],
    freeform_tags={
        "Department": "Finance",
    },
    ingress_security_rules=[{
        "protocol": security_list_ingress_security_rules_protocol,
        "source": security_list_ingress_security_rules_source,
        "description": security_list_ingress_security_rules_description,
        "icmp_options": {
            "type": security_list_ingress_security_rules_icmp_options_type,
            "code": security_list_ingress_security_rules_icmp_options_code,
        },
        "source_type": security_list_ingress_security_rules_source_type,
        "stateless": security_list_ingress_security_rules_stateless,
        "tcp_options": {
            "max": security_list_ingress_security_rules_tcp_options_destination_port_range_max,
            "min": security_list_ingress_security_rules_tcp_options_destination_port_range_min,
            "source_port_range": {
                "max": security_list_ingress_security_rules_tcp_options_source_port_range_max,
                "min": security_list_ingress_security_rules_tcp_options_source_port_range_min,
            },
        },
        "udp_options": {
            "max": security_list_ingress_security_rules_udp_options_destination_port_range_max,
            "min": security_list_ingress_security_rules_udp_options_destination_port_range_min,
            "source_port_range": {
                "max": security_list_ingress_security_rules_udp_options_source_port_range_max,
                "min": security_list_ingress_security_rules_udp_options_source_port_range_min,
            },
        },
    }])
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/core"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := core.NewSecurityList(ctx, "test_security_list", &core.SecurityListArgs{
			CompartmentId: pulumi.Any(compartmentId),
			VcnId:         pulumi.Any(testVcn.Id),
			DefinedTags: pulumi.StringMap{
				"Operations.CostCenter": pulumi.String("42"),
			},
			DisplayName: pulumi.Any(securityListDisplayName),
			EgressSecurityRules: core.SecurityListEgressSecurityRuleArray{
				&core.SecurityListEgressSecurityRuleArgs{
					Destination:     pulumi.Any(securityListEgressSecurityRulesDestination),
					Protocol:        pulumi.Any(securityListEgressSecurityRulesProtocol),
					Description:     pulumi.Any(securityListEgressSecurityRulesDescription),
					DestinationType: pulumi.Any(securityListEgressSecurityRulesDestinationType),
					IcmpOptions: &core.SecurityListEgressSecurityRuleIcmpOptionsArgs{
						Type: pulumi.Any(securityListEgressSecurityRulesIcmpOptionsType),
						Code: pulumi.Any(securityListEgressSecurityRulesIcmpOptionsCode),
					},
					Stateless: pulumi.Any(securityListEgressSecurityRulesStateless),
					TcpOptions: &core.SecurityListEgressSecurityRuleTcpOptionsArgs{
						Max: pulumi.Any(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax),
						Min: pulumi.Any(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin),
						SourcePortRange: &core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs{
							Max: pulumi.Any(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax),
							Min: pulumi.Any(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin),
						},
					},
					UdpOptions: &core.SecurityListEgressSecurityRuleUdpOptionsArgs{
						Max: pulumi.Any(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax),
						Min: pulumi.Any(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin),
						SourcePortRange: &core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs{
							Max: pulumi.Any(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax),
							Min: pulumi.Any(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin),
						},
					},
				},
			},
			FreeformTags: pulumi.StringMap{
				"Department": pulumi.String("Finance"),
			},
			IngressSecurityRules: core.SecurityListIngressSecurityRuleArray{
				&core.SecurityListIngressSecurityRuleArgs{
					Protocol:    pulumi.Any(securityListIngressSecurityRulesProtocol),
					Source:      pulumi.Any(securityListIngressSecurityRulesSource),
					Description: pulumi.Any(securityListIngressSecurityRulesDescription),
					IcmpOptions: &core.SecurityListIngressSecurityRuleIcmpOptionsArgs{
						Type: pulumi.Any(securityListIngressSecurityRulesIcmpOptionsType),
						Code: pulumi.Any(securityListIngressSecurityRulesIcmpOptionsCode),
					},
					SourceType: pulumi.Any(securityListIngressSecurityRulesSourceType),
					Stateless:  pulumi.Any(securityListIngressSecurityRulesStateless),
					TcpOptions: &core.SecurityListIngressSecurityRuleTcpOptionsArgs{
						Max: pulumi.Any(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax),
						Min: pulumi.Any(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin),
						SourcePortRange: &core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs{
							Max: pulumi.Any(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax),
							Min: pulumi.Any(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin),
						},
					},
					UdpOptions: &core.SecurityListIngressSecurityRuleUdpOptionsArgs{
						Max: pulumi.Any(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax),
						Min: pulumi.Any(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin),
						SourcePortRange: &core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs{
							Max: pulumi.Any(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax),
							Min: pulumi.Any(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin),
						},
					},
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testSecurityList = new Oci.Core.SecurityList("test_security_list", new()
    {
        CompartmentId = compartmentId,
        VcnId = testVcn.Id,
        DefinedTags = 
        {
            { "Operations.CostCenter", "42" },
        },
        DisplayName = securityListDisplayName,
        EgressSecurityRules = new[]
        {
            new Oci.Core.Inputs.SecurityListEgressSecurityRuleArgs
            {
                Destination = securityListEgressSecurityRulesDestination,
                Protocol = securityListEgressSecurityRulesProtocol,
                Description = securityListEgressSecurityRulesDescription,
                DestinationType = securityListEgressSecurityRulesDestinationType,
                IcmpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs
                {
                    Type = securityListEgressSecurityRulesIcmpOptionsType,
                    Code = securityListEgressSecurityRulesIcmpOptionsCode,
                },
                Stateless = securityListEgressSecurityRulesStateless,
                TcpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsArgs
                {
                    Max = securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax,
                    Min = securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin,
                    SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs
                    {
                        Max = securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax,
                        Min = securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin,
                    },
                },
                UdpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsArgs
                {
                    Max = securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax,
                    Min = securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin,
                    SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs
                    {
                        Max = securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax,
                        Min = securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin,
                    },
                },
            },
        },
        FreeformTags = 
        {
            { "Department", "Finance" },
        },
        IngressSecurityRules = new[]
        {
            new Oci.Core.Inputs.SecurityListIngressSecurityRuleArgs
            {
                Protocol = securityListIngressSecurityRulesProtocol,
                Source = securityListIngressSecurityRulesSource,
                Description = securityListIngressSecurityRulesDescription,
                IcmpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs
                {
                    Type = securityListIngressSecurityRulesIcmpOptionsType,
                    Code = securityListIngressSecurityRulesIcmpOptionsCode,
                },
                SourceType = securityListIngressSecurityRulesSourceType,
                Stateless = securityListIngressSecurityRulesStateless,
                TcpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsArgs
                {
                    Max = securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax,
                    Min = securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin,
                    SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs
                    {
                        Max = securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax,
                        Min = securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin,
                    },
                },
                UdpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsArgs
                {
                    Max = securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax,
                    Min = securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin,
                    SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs
                    {
                        Max = securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax,
                        Min = securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin,
                    },
                },
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Core.SecurityList;
import com.pulumi.oci.Core.SecurityListArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleTcpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleUdpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleTcpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleUdpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var testSecurityList = new SecurityList("testSecurityList", SecurityListArgs.builder()
            .compartmentId(compartmentId)
            .vcnId(testVcn.id())
            .definedTags(Map.of("Operations.CostCenter", "42"))
            .displayName(securityListDisplayName)
            .egressSecurityRules(SecurityListEgressSecurityRuleArgs.builder()
                .destination(securityListEgressSecurityRulesDestination)
                .protocol(securityListEgressSecurityRulesProtocol)
                .description(securityListEgressSecurityRulesDescription)
                .destinationType(securityListEgressSecurityRulesDestinationType)
                .icmpOptions(SecurityListEgressSecurityRuleIcmpOptionsArgs.builder()
                    .type(securityListEgressSecurityRulesIcmpOptionsType)
                    .code(securityListEgressSecurityRulesIcmpOptionsCode)
                    .build())
                .stateless(securityListEgressSecurityRulesStateless)
                .tcpOptions(SecurityListEgressSecurityRuleTcpOptionsArgs.builder()
                    .max(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax)
                    .min(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin)
                    .sourcePortRange(SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
                        .max(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax)
                        .min(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin)
                        .build())
                    .build())
                .udpOptions(SecurityListEgressSecurityRuleUdpOptionsArgs.builder()
                    .max(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax)
                    .min(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin)
                    .sourcePortRange(SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
                        .max(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax)
                        .min(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin)
                        .build())
                    .build())
                .build())
            .freeformTags(Map.of("Department", "Finance"))
            .ingressSecurityRules(SecurityListIngressSecurityRuleArgs.builder()
                .protocol(securityListIngressSecurityRulesProtocol)
                .source(securityListIngressSecurityRulesSource)
                .description(securityListIngressSecurityRulesDescription)
                .icmpOptions(SecurityListIngressSecurityRuleIcmpOptionsArgs.builder()
                    .type(securityListIngressSecurityRulesIcmpOptionsType)
                    .code(securityListIngressSecurityRulesIcmpOptionsCode)
                    .build())
                .sourceType(securityListIngressSecurityRulesSourceType)
                .stateless(securityListIngressSecurityRulesStateless)
                .tcpOptions(SecurityListIngressSecurityRuleTcpOptionsArgs.builder()
                    .max(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax)
                    .min(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin)
                    .sourcePortRange(SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
                        .max(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax)
                        .min(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin)
                        .build())
                    .build())
                .udpOptions(SecurityListIngressSecurityRuleUdpOptionsArgs.builder()
                    .max(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax)
                    .min(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin)
                    .sourcePortRange(SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
                        .max(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax)
                        .min(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin)
                        .build())
                    .build())
                .build())
            .build());
    }
}
resources:
  testSecurityList:
    type: oci:Core:SecurityList
    name: test_security_list
    properties:
      compartmentId: ${compartmentId}
      vcnId: ${testVcn.id}
      definedTags:
        Operations.CostCenter: '42'
      displayName: ${securityListDisplayName}
      egressSecurityRules:
        - destination: ${securityListEgressSecurityRulesDestination}
          protocol: ${securityListEgressSecurityRulesProtocol}
          description: ${securityListEgressSecurityRulesDescription}
          destinationType: ${securityListEgressSecurityRulesDestinationType}
          icmpOptions:
            type: ${securityListEgressSecurityRulesIcmpOptionsType}
            code: ${securityListEgressSecurityRulesIcmpOptionsCode}
          stateless: ${securityListEgressSecurityRulesStateless}
          tcpOptions:
            max: ${securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax}
            min: ${securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin}
            sourcePortRange:
              max: ${securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax}
              min: ${securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin}
          udpOptions:
            max: ${securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax}
            min: ${securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin}
            sourcePortRange:
              max: ${securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax}
              min: ${securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin}
      freeformTags:
        Department: Finance
      ingressSecurityRules:
        - protocol: ${securityListIngressSecurityRulesProtocol}
          source: ${securityListIngressSecurityRulesSource}
          description: ${securityListIngressSecurityRulesDescription}
          icmpOptions:
            type: ${securityListIngressSecurityRulesIcmpOptionsType}
            code: ${securityListIngressSecurityRulesIcmpOptionsCode}
          sourceType: ${securityListIngressSecurityRulesSourceType}
          stateless: ${securityListIngressSecurityRulesStateless}
          tcpOptions:
            max: ${securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax}
            min: ${securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin}
            sourcePortRange:
              max: ${securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax}
              min: ${securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin}
          udpOptions:
            max: ${securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax}
            min: ${securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin}
            sourcePortRange:
              max: ${securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax}
              min: ${securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin}
Create SecurityList Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecurityList(name: string, args: SecurityListArgs, opts?: CustomResourceOptions);@overload
def SecurityList(resource_name: str,
                 args: SecurityListArgs,
                 opts: Optional[ResourceOptions] = None)
@overload
def SecurityList(resource_name: str,
                 opts: Optional[ResourceOptions] = None,
                 compartment_id: Optional[str] = None,
                 vcn_id: Optional[str] = None,
                 defined_tags: Optional[Mapping[str, str]] = None,
                 display_name: Optional[str] = None,
                 egress_security_rules: Optional[Sequence[SecurityListEgressSecurityRuleArgs]] = None,
                 freeform_tags: Optional[Mapping[str, str]] = None,
                 ingress_security_rules: Optional[Sequence[SecurityListIngressSecurityRuleArgs]] = None)func NewSecurityList(ctx *Context, name string, args SecurityListArgs, opts ...ResourceOption) (*SecurityList, error)public SecurityList(string name, SecurityListArgs args, CustomResourceOptions? opts = null)
public SecurityList(String name, SecurityListArgs args)
public SecurityList(String name, SecurityListArgs args, CustomResourceOptions options)
type: oci:Core:SecurityList
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securityListResource = new Oci.Core.SecurityList("securityListResource", new()
{
    CompartmentId = "string",
    VcnId = "string",
    DefinedTags = 
    {
        { "string", "string" },
    },
    DisplayName = "string",
    EgressSecurityRules = new[]
    {
        new Oci.Core.Inputs.SecurityListEgressSecurityRuleArgs
        {
            Destination = "string",
            Protocol = "string",
            Description = "string",
            DestinationType = "string",
            IcmpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs
            {
                Type = 0,
                Code = 0,
            },
            Stateless = false,
            TcpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsArgs
            {
                Max = 0,
                Min = 0,
                SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs
                {
                    Max = 0,
                    Min = 0,
                },
            },
            UdpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsArgs
            {
                Max = 0,
                Min = 0,
                SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs
                {
                    Max = 0,
                    Min = 0,
                },
            },
        },
    },
    FreeformTags = 
    {
        { "string", "string" },
    },
    IngressSecurityRules = new[]
    {
        new Oci.Core.Inputs.SecurityListIngressSecurityRuleArgs
        {
            Protocol = "string",
            Source = "string",
            Description = "string",
            IcmpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs
            {
                Type = 0,
                Code = 0,
            },
            SourceType = "string",
            Stateless = false,
            TcpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsArgs
            {
                Max = 0,
                Min = 0,
                SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs
                {
                    Max = 0,
                    Min = 0,
                },
            },
            UdpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsArgs
            {
                Max = 0,
                Min = 0,
                SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs
                {
                    Max = 0,
                    Min = 0,
                },
            },
        },
    },
});
example, err := core.NewSecurityList(ctx, "securityListResource", &core.SecurityListArgs{
	CompartmentId: pulumi.String("string"),
	VcnId:         pulumi.String("string"),
	DefinedTags: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	DisplayName: pulumi.String("string"),
	EgressSecurityRules: core.SecurityListEgressSecurityRuleArray{
		&core.SecurityListEgressSecurityRuleArgs{
			Destination:     pulumi.String("string"),
			Protocol:        pulumi.String("string"),
			Description:     pulumi.String("string"),
			DestinationType: pulumi.String("string"),
			IcmpOptions: &core.SecurityListEgressSecurityRuleIcmpOptionsArgs{
				Type: pulumi.Int(0),
				Code: pulumi.Int(0),
			},
			Stateless: pulumi.Bool(false),
			TcpOptions: &core.SecurityListEgressSecurityRuleTcpOptionsArgs{
				Max: pulumi.Int(0),
				Min: pulumi.Int(0),
				SourcePortRange: &core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs{
					Max: pulumi.Int(0),
					Min: pulumi.Int(0),
				},
			},
			UdpOptions: &core.SecurityListEgressSecurityRuleUdpOptionsArgs{
				Max: pulumi.Int(0),
				Min: pulumi.Int(0),
				SourcePortRange: &core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs{
					Max: pulumi.Int(0),
					Min: pulumi.Int(0),
				},
			},
		},
	},
	FreeformTags: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	IngressSecurityRules: core.SecurityListIngressSecurityRuleArray{
		&core.SecurityListIngressSecurityRuleArgs{
			Protocol:    pulumi.String("string"),
			Source:      pulumi.String("string"),
			Description: pulumi.String("string"),
			IcmpOptions: &core.SecurityListIngressSecurityRuleIcmpOptionsArgs{
				Type: pulumi.Int(0),
				Code: pulumi.Int(0),
			},
			SourceType: pulumi.String("string"),
			Stateless:  pulumi.Bool(false),
			TcpOptions: &core.SecurityListIngressSecurityRuleTcpOptionsArgs{
				Max: pulumi.Int(0),
				Min: pulumi.Int(0),
				SourcePortRange: &core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs{
					Max: pulumi.Int(0),
					Min: pulumi.Int(0),
				},
			},
			UdpOptions: &core.SecurityListIngressSecurityRuleUdpOptionsArgs{
				Max: pulumi.Int(0),
				Min: pulumi.Int(0),
				SourcePortRange: &core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs{
					Max: pulumi.Int(0),
					Min: pulumi.Int(0),
				},
			},
		},
	},
})
var securityListResource = new SecurityList("securityListResource", SecurityListArgs.builder()
    .compartmentId("string")
    .vcnId("string")
    .definedTags(Map.of("string", "string"))
    .displayName("string")
    .egressSecurityRules(SecurityListEgressSecurityRuleArgs.builder()
        .destination("string")
        .protocol("string")
        .description("string")
        .destinationType("string")
        .icmpOptions(SecurityListEgressSecurityRuleIcmpOptionsArgs.builder()
            .type(0)
            .code(0)
            .build())
        .stateless(false)
        .tcpOptions(SecurityListEgressSecurityRuleTcpOptionsArgs.builder()
            .max(0)
            .min(0)
            .sourcePortRange(SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
                .max(0)
                .min(0)
                .build())
            .build())
        .udpOptions(SecurityListEgressSecurityRuleUdpOptionsArgs.builder()
            .max(0)
            .min(0)
            .sourcePortRange(SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
                .max(0)
                .min(0)
                .build())
            .build())
        .build())
    .freeformTags(Map.of("string", "string"))
    .ingressSecurityRules(SecurityListIngressSecurityRuleArgs.builder()
        .protocol("string")
        .source("string")
        .description("string")
        .icmpOptions(SecurityListIngressSecurityRuleIcmpOptionsArgs.builder()
            .type(0)
            .code(0)
            .build())
        .sourceType("string")
        .stateless(false)
        .tcpOptions(SecurityListIngressSecurityRuleTcpOptionsArgs.builder()
            .max(0)
            .min(0)
            .sourcePortRange(SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
                .max(0)
                .min(0)
                .build())
            .build())
        .udpOptions(SecurityListIngressSecurityRuleUdpOptionsArgs.builder()
            .max(0)
            .min(0)
            .sourcePortRange(SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
                .max(0)
                .min(0)
                .build())
            .build())
        .build())
    .build());
security_list_resource = oci.core.SecurityList("securityListResource",
    compartment_id="string",
    vcn_id="string",
    defined_tags={
        "string": "string",
    },
    display_name="string",
    egress_security_rules=[{
        "destination": "string",
        "protocol": "string",
        "description": "string",
        "destination_type": "string",
        "icmp_options": {
            "type": 0,
            "code": 0,
        },
        "stateless": False,
        "tcp_options": {
            "max": 0,
            "min": 0,
            "source_port_range": {
                "max": 0,
                "min": 0,
            },
        },
        "udp_options": {
            "max": 0,
            "min": 0,
            "source_port_range": {
                "max": 0,
                "min": 0,
            },
        },
    }],
    freeform_tags={
        "string": "string",
    },
    ingress_security_rules=[{
        "protocol": "string",
        "source": "string",
        "description": "string",
        "icmp_options": {
            "type": 0,
            "code": 0,
        },
        "source_type": "string",
        "stateless": False,
        "tcp_options": {
            "max": 0,
            "min": 0,
            "source_port_range": {
                "max": 0,
                "min": 0,
            },
        },
        "udp_options": {
            "max": 0,
            "min": 0,
            "source_port_range": {
                "max": 0,
                "min": 0,
            },
        },
    }])
const securityListResource = new oci.core.SecurityList("securityListResource", {
    compartmentId: "string",
    vcnId: "string",
    definedTags: {
        string: "string",
    },
    displayName: "string",
    egressSecurityRules: [{
        destination: "string",
        protocol: "string",
        description: "string",
        destinationType: "string",
        icmpOptions: {
            type: 0,
            code: 0,
        },
        stateless: false,
        tcpOptions: {
            max: 0,
            min: 0,
            sourcePortRange: {
                max: 0,
                min: 0,
            },
        },
        udpOptions: {
            max: 0,
            min: 0,
            sourcePortRange: {
                max: 0,
                min: 0,
            },
        },
    }],
    freeformTags: {
        string: "string",
    },
    ingressSecurityRules: [{
        protocol: "string",
        source: "string",
        description: "string",
        icmpOptions: {
            type: 0,
            code: 0,
        },
        sourceType: "string",
        stateless: false,
        tcpOptions: {
            max: 0,
            min: 0,
            sourcePortRange: {
                max: 0,
                min: 0,
            },
        },
        udpOptions: {
            max: 0,
            min: 0,
            sourcePortRange: {
                max: 0,
                min: 0,
            },
        },
    }],
});
type: oci:Core:SecurityList
properties:
    compartmentId: string
    definedTags:
        string: string
    displayName: string
    egressSecurityRules:
        - description: string
          destination: string
          destinationType: string
          icmpOptions:
            code: 0
            type: 0
          protocol: string
          stateless: false
          tcpOptions:
            max: 0
            min: 0
            sourcePortRange:
                max: 0
                min: 0
          udpOptions:
            max: 0
            min: 0
            sourcePortRange:
                max: 0
                min: 0
    freeformTags:
        string: string
    ingressSecurityRules:
        - description: string
          icmpOptions:
            code: 0
            type: 0
          protocol: string
          source: string
          sourceType: string
          stateless: false
          tcpOptions:
            max: 0
            min: 0
            sourcePortRange:
                max: 0
                min: 0
          udpOptions:
            max: 0
            min: 0
            sourcePortRange:
                max: 0
                min: 0
    vcnId: string
SecurityList Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecurityList resource accepts the following input properties:
- CompartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- VcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Dictionary<string, string>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- EgressSecurity List<SecurityRules List Egress Security Rule> 
- (Updatable) Rules for allowing egress IP packets.
- Dictionary<string, string>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- IngressSecurity List<SecurityRules List Ingress Security Rule> 
- (Updatable) Rules for allowing ingress IP packets.
- CompartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- VcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- map[string]string
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- EgressSecurity []SecurityRules List Egress Security Rule Args 
- (Updatable) Rules for allowing egress IP packets.
- map[string]string
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- IngressSecurity []SecurityRules List Ingress Security Rule Args 
- (Updatable) Rules for allowing ingress IP packets.
- compartmentId String
- (Updatable) The OCID of the compartment to contain the security list.
- vcnId String
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Map<String,String>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity List<SecurityRules List Egress Security Rule> 
- (Updatable) Rules for allowing egress IP packets.
- Map<String,String>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity List<SecurityRules List Ingress Security Rule> 
- (Updatable) Rules for allowing ingress IP packets.
- compartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- vcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- {[key: string]: string}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity SecurityRules List Egress Security Rule[] 
- (Updatable) Rules for allowing egress IP packets.
- {[key: string]: string}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity SecurityRules List Ingress Security Rule[] 
- (Updatable) Rules for allowing ingress IP packets.
- compartment_id str
- (Updatable) The OCID of the compartment to contain the security list.
- vcn_id str
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Mapping[str, str]
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- display_name str
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress_security_ Sequence[Securityrules List Egress Security Rule Args] 
- (Updatable) Rules for allowing egress IP packets.
- Mapping[str, str]
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingress_security_ Sequence[Securityrules List Ingress Security Rule Args] 
- (Updatable) Rules for allowing ingress IP packets.
- compartmentId String
- (Updatable) The OCID of the compartment to contain the security list.
- vcnId String
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Map<String>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity List<Property Map>Rules 
- (Updatable) Rules for allowing egress IP packets.
- Map<String>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity List<Property Map>Rules 
- (Updatable) Rules for allowing ingress IP packets.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecurityList resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- State string
- The security list's current state.
- TimeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- Id string
- The provider-assigned unique ID for this managed resource.
- State string
- The security list's current state.
- TimeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- id String
- The provider-assigned unique ID for this managed resource.
- state String
- The security list's current state.
- timeCreated String
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- id string
- The provider-assigned unique ID for this managed resource.
- state string
- The security list's current state.
- timeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- id str
- The provider-assigned unique ID for this managed resource.
- state str
- The security list's current state.
- time_created str
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- id String
- The provider-assigned unique ID for this managed resource.
- state String
- The security list's current state.
- timeCreated String
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
Look up Existing SecurityList Resource
Get an existing SecurityList resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecurityListState, opts?: CustomResourceOptions): SecurityList@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        compartment_id: Optional[str] = None,
        defined_tags: Optional[Mapping[str, str]] = None,
        display_name: Optional[str] = None,
        egress_security_rules: Optional[Sequence[SecurityListEgressSecurityRuleArgs]] = None,
        freeform_tags: Optional[Mapping[str, str]] = None,
        ingress_security_rules: Optional[Sequence[SecurityListIngressSecurityRuleArgs]] = None,
        state: Optional[str] = None,
        time_created: Optional[str] = None,
        vcn_id: Optional[str] = None) -> SecurityListfunc GetSecurityList(ctx *Context, name string, id IDInput, state *SecurityListState, opts ...ResourceOption) (*SecurityList, error)public static SecurityList Get(string name, Input<string> id, SecurityListState? state, CustomResourceOptions? opts = null)public static SecurityList get(String name, Output<String> id, SecurityListState state, CustomResourceOptions options)resources:  _:    type: oci:Core:SecurityList    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- CompartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- Dictionary<string, string>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- EgressSecurity List<SecurityRules List Egress Security Rule> 
- (Updatable) Rules for allowing egress IP packets.
- Dictionary<string, string>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- IngressSecurity List<SecurityRules List Ingress Security Rule> 
- (Updatable) Rules for allowing ingress IP packets.
- State string
- The security list's current state.
- TimeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- VcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- CompartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- map[string]string
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- DisplayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- EgressSecurity []SecurityRules List Egress Security Rule Args 
- (Updatable) Rules for allowing egress IP packets.
- map[string]string
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- IngressSecurity []SecurityRules List Ingress Security Rule Args 
- (Updatable) Rules for allowing ingress IP packets.
- State string
- The security list's current state.
- TimeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- VcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- compartmentId String
- (Updatable) The OCID of the compartment to contain the security list.
- Map<String,String>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity List<SecurityRules List Egress Security Rule> 
- (Updatable) Rules for allowing egress IP packets.
- Map<String,String>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity List<SecurityRules List Ingress Security Rule> 
- (Updatable) Rules for allowing ingress IP packets.
- state String
- The security list's current state.
- timeCreated String
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- vcnId String
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- compartmentId string
- (Updatable) The OCID of the compartment to contain the security list.
- {[key: string]: string}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName string
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity SecurityRules List Egress Security Rule[] 
- (Updatable) Rules for allowing egress IP packets.
- {[key: string]: string}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity SecurityRules List Ingress Security Rule[] 
- (Updatable) Rules for allowing ingress IP packets.
- state string
- The security list's current state.
- timeCreated string
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- vcnId string
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- compartment_id str
- (Updatable) The OCID of the compartment to contain the security list.
- Mapping[str, str]
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- display_name str
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress_security_ Sequence[Securityrules List Egress Security Rule Args] 
- (Updatable) Rules for allowing egress IP packets.
- Mapping[str, str]
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingress_security_ Sequence[Securityrules List Ingress Security Rule Args] 
- (Updatable) Rules for allowing ingress IP packets.
- state str
- The security list's current state.
- time_created str
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- vcn_id str
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- compartmentId String
- (Updatable) The OCID of the compartment to contain the security list.
- Map<String>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- displayName String
- (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egressSecurity List<Property Map>Rules 
- (Updatable) Rules for allowing egress IP packets.
- Map<String>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- ingressSecurity List<Property Map>Rules 
- (Updatable) Rules for allowing ingress IP packets.
- state String
- The security list's current state.
- timeCreated String
- The date and time the security list was created, in the format defined by RFC3339. Example: 2016-08-25T21:10:29.600Z
- vcnId String
- The OCID of the VCN the security list belongs to. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
Supporting Types
SecurityListEgressSecurityRule, SecurityListEgressSecurityRuleArgs          
- Destination string
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- Protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Description string
- (Updatable) An optional description of your choice for the rule.
- DestinationType string
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- IcmpOptions SecurityList Egress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions SecurityList Egress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- UdpOptions SecurityList Egress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Destination string
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- Protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Description string
- (Updatable) An optional description of your choice for the rule.
- DestinationType string
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- IcmpOptions SecurityList Egress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions SecurityList Egress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- UdpOptions SecurityList Egress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination String
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- protocol String
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- description String
- (Updatable) An optional description of your choice for the rule.
- destinationType String
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- icmpOptions SecurityList Egress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions SecurityList Egress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions SecurityList Egress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination string
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- description string
- (Updatable) An optional description of your choice for the rule.
- destinationType string
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- icmpOptions SecurityList Egress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- stateless boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions SecurityList Egress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions SecurityList Egress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination str
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- protocol str
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- description str
- (Updatable) An optional description of your choice for the rule.
- destination_type str
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- icmp_options SecurityList Egress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_options SecurityList Egress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp_options SecurityList Egress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination String
- (Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic destined for a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- protocol String
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- description String
- (Updatable) An optional description of your choice for the rule.
- destinationType String
- (Updatable) Type of destination for the rule. The default is - CIDR_BLOCK.- Allowed values: - CIDR_BLOCK: If the rule's- destinationis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- destinationis the- cidrBlockvalue for a Service (the rule is for traffic destined for a particular- Servicethrough a service gateway).
 
- icmpOptions Property Map
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions Property Map
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions Property Map
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
SecurityListEgressSecurityRuleIcmpOptions, SecurityListEgressSecurityRuleIcmpOptionsArgs              
SecurityListEgressSecurityRuleTcpOptions, SecurityListEgressSecurityRuleTcpOptionsArgs              
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Egress Security Rule Tcp Options Source Port Range 
- (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Egress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Egress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Egress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_port_ Securityrange List Egress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort Property MapRange 
- (Updatable)
SecurityListEgressSecurityRuleTcpOptionsSourcePortRange, SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs                    
SecurityListEgressSecurityRuleUdpOptions, SecurityListEgressSecurityRuleUdpOptionsArgs              
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Egress Security Rule Udp Options Source Port Range 
- (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Egress Security Rule Udp Options Source Port Range 
- (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Egress Security Rule Udp Options Source Port Range 
- (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Egress Security Rule Udp Options Source Port Range 
- (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_port_ Securityrange List Egress Security Rule Udp Options Source Port Range 
- (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort Property MapRange 
- (Updatable)
SecurityListEgressSecurityRuleUdpOptionsSourcePortRange, SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs                    
SecurityListIngressSecurityRule, SecurityListIngressSecurityRuleArgs          
- Protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Source string
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- Description string
- (Updatable) An optional description of your choice for the rule.
- IcmpOptions SecurityList Ingress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- SourceType string
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions SecurityList Ingress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- UdpOptions SecurityList Ingress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- Source string
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- Description string
- (Updatable) An optional description of your choice for the rule.
- IcmpOptions SecurityList Ingress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- SourceType string
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- TcpOptions SecurityList Ingress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- UdpOptions SecurityList Ingress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol String
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source String
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- description String
- (Updatable) An optional description of your choice for the rule.
- icmpOptions SecurityList Ingress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- sourceType String
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions SecurityList Ingress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions SecurityList Ingress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol string
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source string
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- description string
- (Updatable) An optional description of your choice for the rule.
- icmpOptions SecurityList Ingress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- sourceType string
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- stateless boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions SecurityList Ingress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions SecurityList Ingress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol str
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source str
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- description str
- (Updatable) An optional description of your choice for the rule.
- icmp_options SecurityList Ingress Security Rule Icmp Options 
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- source_type str
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_options SecurityList Ingress Security Rule Tcp Options 
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp_options SecurityList Ingress Security Rule Udp Options 
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol String
- (Updatable) The transport protocol. Specify either allor an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58").
- source String
- (Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from. - Allowed values: - IP address range in CIDR notation. For example: 192.168.1.0/24or2001:0db8:0123:45::/56. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses.
- The cidrBlockvalue for a Service, if you're setting up a security list rule for traffic coming from a particularServicethrough a service gateway. For example:oci-phx-objectstorage.
 
- IP address range in CIDR notation. For example: 
- description String
- (Updatable) An optional description of your choice for the rule.
- icmpOptions Property Map
- (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in: - If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each. 
- sourceType String
- (Updatable) Type of source for the rule. The default is CIDR_BLOCK.- CIDR_BLOCK: If the rule's- sourceis an IP address range in CIDR notation.
- SERVICE_CIDR_BLOCK: If the rule's- sourceis the- cidrBlockvalue for a Service (the rule is for traffic coming from a particular- Servicethrough a service gateway).
 
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcpOptions Property Map
- (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udpOptions Property Map
- (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
SecurityListIngressSecurityRuleIcmpOptions, SecurityListIngressSecurityRuleIcmpOptionsArgs              
SecurityListIngressSecurityRuleTcpOptions, SecurityListIngressSecurityRuleTcpOptionsArgs              
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Ingress Security Rule Tcp Options Source Port Range 
- (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Ingress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Ingress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Ingress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_port_ Securityrange List Ingress Security Rule Tcp Options Source Port Range 
- (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort Property MapRange 
- (Updatable)
SecurityListIngressSecurityRuleTcpOptionsSourcePortRange, SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs                    
SecurityListIngressSecurityRuleUdpOptions, SecurityListIngressSecurityRuleUdpOptionsArgs              
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Ingress Security Rule Udp Options Source Port Range 
- (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- SourcePort SecurityRange List Ingress Security Rule Udp Options Source Port Range 
- (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Ingress Security Rule Udp Options Source Port Range 
- (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort SecurityRange List Ingress Security Rule Udp Options Source Port Range 
- (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_port_ Securityrange List Ingress Security Rule Udp Options Source Port Range 
- (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- sourcePort Property MapRange 
- (Updatable)
SecurityListIngressSecurityRuleUdpOptionsSourcePortRange, SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs                    
Import
SecurityLists can be imported using the id, e.g.
$ pulumi import oci:Core/securityList:SecurityList test_security_list "id"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.