Oracle Cloud Infrastructure v2.33.0 published on Thursday, May 1, 2025 by Pulumi
oci.NetworkFirewall.getNetworkFirewallPolicySecurityRule
Explore with Pulumi AI
This data source provides details about a specific Network Firewall Policy Security Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Get Security Rule by the given name in the context of network firewall policy.
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
Coming soon!
variables:
  testNetworkFirewallPolicySecurityRule:
    fn::invoke:
      function: oci:NetworkFirewall:getNetworkFirewallPolicySecurityRule
      arguments:
        networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
        securityRuleName: ${ociNetworkFirewallNetworkFirewallPolicySecurityRuleName}
Using getNetworkFirewallPolicySecurityRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getNetworkFirewallPolicySecurityRule(args: GetNetworkFirewallPolicySecurityRuleArgs, opts?: InvokeOptions): Promise<GetNetworkFirewallPolicySecurityRuleResult>
function getNetworkFirewallPolicySecurityRuleOutput(args: GetNetworkFirewallPolicySecurityRuleOutputArgs, opts?: InvokeOptions): Output<GetNetworkFirewallPolicySecurityRuleResult>def get_network_firewall_policy_security_rule(name: Optional[str] = None,
                                              network_firewall_policy_id: Optional[str] = None,
                                              opts: Optional[InvokeOptions] = None) -> GetNetworkFirewallPolicySecurityRuleResult
def get_network_firewall_policy_security_rule_output(name: Optional[pulumi.Input[str]] = None,
                                              network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
                                              opts: Optional[InvokeOptions] = None) -> Output[GetNetworkFirewallPolicySecurityRuleResult]func LookupNetworkFirewallPolicySecurityRule(ctx *Context, args *LookupNetworkFirewallPolicySecurityRuleArgs, opts ...InvokeOption) (*LookupNetworkFirewallPolicySecurityRuleResult, error)
func LookupNetworkFirewallPolicySecurityRuleOutput(ctx *Context, args *LookupNetworkFirewallPolicySecurityRuleOutputArgs, opts ...InvokeOption) LookupNetworkFirewallPolicySecurityRuleResultOutput> Note: This function is named LookupNetworkFirewallPolicySecurityRule in the Go SDK.
public static class GetNetworkFirewallPolicySecurityRule 
{
    public static Task<GetNetworkFirewallPolicySecurityRuleResult> InvokeAsync(GetNetworkFirewallPolicySecurityRuleArgs args, InvokeOptions? opts = null)
    public static Output<GetNetworkFirewallPolicySecurityRuleResult> Invoke(GetNetworkFirewallPolicySecurityRuleInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetNetworkFirewallPolicySecurityRuleResult> getNetworkFirewallPolicySecurityRule(GetNetworkFirewallPolicySecurityRuleArgs args, InvokeOptions options)
public static Output<GetNetworkFirewallPolicySecurityRuleResult> getNetworkFirewallPolicySecurityRule(GetNetworkFirewallPolicySecurityRuleArgs args, InvokeOptions options)
fn::invoke:
  function: oci:NetworkFirewall/getNetworkFirewallPolicySecurityRule:getNetworkFirewallPolicySecurityRule
  arguments:
    # arguments dictionaryThe following arguments are supported:
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- name string
- Name for the Security rule, must be unique within the policy.
- networkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- name str
- Name for the Security rule, must be unique within the policy.
- network_firewall_ strpolicy_ id 
- Unique Network Firewall Policy identifier
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
getNetworkFirewallPolicySecurityRule Result
The following output properties are available:
- Action string
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Conditions
List<GetNetwork Firewall Policy Security Rule Condition> 
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Id string
- Inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- Positions
List<GetNetwork Firewall Policy Security Rule Position> 
- An object which defines the position of the rule.
- PriorityOrder string
- Action string
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Conditions
[]GetNetwork Firewall Policy Security Rule Condition 
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Id string
- Inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- Positions
[]GetNetwork Firewall Policy Security Rule Position 
- An object which defines the position of the rule.
- PriorityOrder string
- action String
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- conditions
List<GetPolicy Security Rule Condition> 
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id String
- inspection String
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
List<GetPolicy Security Rule Position> 
- An object which defines the position of the rule.
- priorityOrder String
- action string
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- conditions
GetNetwork Firewall Policy Security Rule Condition[] 
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id string
- inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name string
- Name for the Security rule, must be unique within the policy.
- networkFirewall stringPolicy Id 
- parentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
GetNetwork Firewall Policy Security Rule Position[] 
- An object which defines the position of the rule.
- priorityOrder string
- action str
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- conditions
Sequence[GetNetwork Firewall Policy Security Rule Condition] 
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id str
- inspection str
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name str
- Name for the Security rule, must be unique within the policy.
- network_firewall_ strpolicy_ id 
- parent_resource_ strid 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
Sequence[GetNetwork Firewall Policy Security Rule Position] 
- An object which defines the position of the rule.
- priority_order str
- action String
- Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- conditions List<Property Map>
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id String
- inspection String
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions List<Property Map>
- An object which defines the position of the rule.
- priorityOrder String
Supporting Types
GetNetworkFirewallPolicySecurityRuleCondition      
- Applications List<string>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- DestinationAddresses List<string>
- An array of IP address list names to be evaluated against the traffic destination address.
- Services List<string>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- SourceAddresses List<string>
- An array of IP address list names to be evaluated against the traffic source address.
- Urls List<string>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- Applications []string
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- DestinationAddresses []string
- An array of IP address list names to be evaluated against the traffic destination address.
- Services []string
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- SourceAddresses []string
- An array of IP address list names to be evaluated against the traffic source address.
- Urls []string
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses List<String>
- An array of IP address list names to be evaluated against the traffic destination address.
- services List<String>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses List<String>
- An array of IP address list names to be evaluated against the traffic source address.
- urls List<String>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications string[]
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses string[]
- An array of IP address list names to be evaluated against the traffic destination address.
- services string[]
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses string[]
- An array of IP address list names to be evaluated against the traffic source address.
- urls string[]
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications Sequence[str]
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination_addresses Sequence[str]
- An array of IP address list names to be evaluated against the traffic destination address.
- services Sequence[str]
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source_addresses Sequence[str]
- An array of IP address list names to be evaluated against the traffic source address.
- urls Sequence[str]
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses List<String>
- An array of IP address list names to be evaluated against the traffic destination address.
- services List<String>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses List<String>
- An array of IP address list names to be evaluated against the traffic source address.
- urls List<String>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
GetNetworkFirewallPolicySecurityRulePosition      
- AfterRule string
- Identifier for rule after which this rule lies.
- BeforeRule string
- Identifier for rule before which this rule lies.
- AfterRule string
- Identifier for rule after which this rule lies.
- BeforeRule string
- Identifier for rule before which this rule lies.
- afterRule String
- Identifier for rule after which this rule lies.
- beforeRule String
- Identifier for rule before which this rule lies.
- afterRule string
- Identifier for rule after which this rule lies.
- beforeRule string
- Identifier for rule before which this rule lies.
- after_rule str
- Identifier for rule after which this rule lies.
- before_rule str
- Identifier for rule before which this rule lies.
- afterRule String
- Identifier for rule after which this rule lies.
- beforeRule String
- Identifier for rule before which this rule lies.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.