oci.NetworkFirewall.NetworkFirewallPolicySecurityRule
Explore with Pulumi AI
This resource provides the Network Firewall Policy Security Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Creates a new Security Rule for the Network Firewall Policy.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkFirewallPolicySecurityRule = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", {
    action: networkFirewallPolicySecurityRuleAction,
    name: networkFirewallPolicySecurityRuleName,
    condition: {
        applications: networkFirewallPolicySecurityRuleConditionApplication,
        destinationAddresses: networkFirewallPolicySecurityRuleConditionDestinationAddress,
        services: networkFirewallPolicySecurityRuleConditionService,
        sourceAddresses: networkFirewallPolicySecurityRuleConditionSourceAddress,
        urls: networkFirewallPolicySecurityRuleConditionUrl,
    },
    networkFirewallPolicyId: testNetworkFirewallPolicy.id,
    inspection: networkFirewallPolicySecurityRuleInspection,
    positions: [{
        afterRule: networkFirewallPolicySecurityRulePositionAfterRule,
        beforeRule: networkFirewallPolicySecurityRulePositionBeforeRule,
    }],
});
import pulumi
import pulumi_oci as oci
test_network_firewall_policy_security_rule = oci.network_firewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule",
    action=network_firewall_policy_security_rule_action,
    name=network_firewall_policy_security_rule_name,
    condition={
        "applications": network_firewall_policy_security_rule_condition_application,
        "destination_addresses": network_firewall_policy_security_rule_condition_destination_address,
        "services": network_firewall_policy_security_rule_condition_service,
        "source_addresses": network_firewall_policy_security_rule_condition_source_address,
        "urls": network_firewall_policy_security_rule_condition_url,
    },
    network_firewall_policy_id=test_network_firewall_policy["id"],
    inspection=network_firewall_policy_security_rule_inspection,
    positions=[{
        "after_rule": network_firewall_policy_security_rule_position_after_rule,
        "before_rule": network_firewall_policy_security_rule_position_before_rule,
    }])
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/networkfirewall"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := networkfirewall.NewNetworkFirewallPolicySecurityRule(ctx, "test_network_firewall_policy_security_rule", &networkfirewall.NetworkFirewallPolicySecurityRuleArgs{
			Action: pulumi.Any(networkFirewallPolicySecurityRuleAction),
			Name:   pulumi.Any(networkFirewallPolicySecurityRuleName),
			Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
				Applications:         pulumi.Any(networkFirewallPolicySecurityRuleConditionApplication),
				DestinationAddresses: pulumi.Any(networkFirewallPolicySecurityRuleConditionDestinationAddress),
				Services:             pulumi.Any(networkFirewallPolicySecurityRuleConditionService),
				SourceAddresses:      pulumi.Any(networkFirewallPolicySecurityRuleConditionSourceAddress),
				Urls:                 pulumi.Any(networkFirewallPolicySecurityRuleConditionUrl),
			},
			NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
			Inspection:              pulumi.Any(networkFirewallPolicySecurityRuleInspection),
			Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
				&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
					AfterRule:  pulumi.Any(networkFirewallPolicySecurityRulePositionAfterRule),
					BeforeRule: pulumi.Any(networkFirewallPolicySecurityRulePositionBeforeRule),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testNetworkFirewallPolicySecurityRule = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", new()
    {
        Action = networkFirewallPolicySecurityRuleAction,
        Name = networkFirewallPolicySecurityRuleName,
        Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
        {
            Applications = networkFirewallPolicySecurityRuleConditionApplication,
            DestinationAddresses = networkFirewallPolicySecurityRuleConditionDestinationAddress,
            Services = networkFirewallPolicySecurityRuleConditionService,
            SourceAddresses = networkFirewallPolicySecurityRuleConditionSourceAddress,
            Urls = networkFirewallPolicySecurityRuleConditionUrl,
        },
        NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
        Inspection = networkFirewallPolicySecurityRuleInspection,
        Positions = new[]
        {
            new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
            {
                AfterRule = networkFirewallPolicySecurityRulePositionAfterRule,
                BeforeRule = networkFirewallPolicySecurityRulePositionBeforeRule,
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRule;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRuleConditionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRulePositionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var testNetworkFirewallPolicySecurityRule = new NetworkFirewallPolicySecurityRule("testNetworkFirewallPolicySecurityRule", NetworkFirewallPolicySecurityRuleArgs.builder()
            .action(networkFirewallPolicySecurityRuleAction)
            .name(networkFirewallPolicySecurityRuleName)
            .condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
                .applications(networkFirewallPolicySecurityRuleConditionApplication)
                .destinationAddresses(networkFirewallPolicySecurityRuleConditionDestinationAddress)
                .services(networkFirewallPolicySecurityRuleConditionService)
                .sourceAddresses(networkFirewallPolicySecurityRuleConditionSourceAddress)
                .urls(networkFirewallPolicySecurityRuleConditionUrl)
                .build())
            .networkFirewallPolicyId(testNetworkFirewallPolicy.id())
            .inspection(networkFirewallPolicySecurityRuleInspection)
            .positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
                .afterRule(networkFirewallPolicySecurityRulePositionAfterRule)
                .beforeRule(networkFirewallPolicySecurityRulePositionBeforeRule)
                .build())
            .build());
    }
}
resources:
  testNetworkFirewallPolicySecurityRule:
    type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
    name: test_network_firewall_policy_security_rule
    properties:
      action: ${networkFirewallPolicySecurityRuleAction}
      name: ${networkFirewallPolicySecurityRuleName}
      condition:
        applications: ${networkFirewallPolicySecurityRuleConditionApplication}
        destinationAddresses: ${networkFirewallPolicySecurityRuleConditionDestinationAddress}
        services: ${networkFirewallPolicySecurityRuleConditionService}
        sourceAddresses: ${networkFirewallPolicySecurityRuleConditionSourceAddress}
        urls: ${networkFirewallPolicySecurityRuleConditionUrl}
      networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
      inspection: ${networkFirewallPolicySecurityRuleInspection}
      positions:
        - afterRule: ${networkFirewallPolicySecurityRulePositionAfterRule}
          beforeRule: ${networkFirewallPolicySecurityRulePositionBeforeRule}
Create NetworkFirewallPolicySecurityRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NetworkFirewallPolicySecurityRule(name: string, args: NetworkFirewallPolicySecurityRuleArgs, opts?: CustomResourceOptions);@overload
def NetworkFirewallPolicySecurityRule(resource_name: str,
                                      args: NetworkFirewallPolicySecurityRuleArgs,
                                      opts: Optional[ResourceOptions] = None)
@overload
def NetworkFirewallPolicySecurityRule(resource_name: str,
                                      opts: Optional[ResourceOptions] = None,
                                      action: Optional[str] = None,
                                      condition: Optional[NetworkFirewallPolicySecurityRuleConditionArgs] = None,
                                      network_firewall_policy_id: Optional[str] = None,
                                      inspection: Optional[str] = None,
                                      name: Optional[str] = None,
                                      positions: Optional[Sequence[NetworkFirewallPolicySecurityRulePositionArgs]] = None,
                                      priority_order: Optional[str] = None)func NewNetworkFirewallPolicySecurityRule(ctx *Context, name string, args NetworkFirewallPolicySecurityRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)public NetworkFirewallPolicySecurityRule(string name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions? opts = null)
public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args)
public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions options)
type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var networkFirewallPolicySecurityRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", new()
{
    Action = "string",
    Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
    {
        Applications = new[]
        {
            "string",
        },
        DestinationAddresses = new[]
        {
            "string",
        },
        Services = new[]
        {
            "string",
        },
        SourceAddresses = new[]
        {
            "string",
        },
        Urls = new[]
        {
            "string",
        },
    },
    NetworkFirewallPolicyId = "string",
    Inspection = "string",
    Name = "string",
    Positions = new[]
    {
        new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
        {
            AfterRule = "string",
            BeforeRule = "string",
        },
    },
    PriorityOrder = "string",
});
example, err := networkfirewall.NewNetworkFirewallPolicySecurityRule(ctx, "networkFirewallPolicySecurityRuleResource", &networkfirewall.NetworkFirewallPolicySecurityRuleArgs{
	Action: pulumi.String("string"),
	Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
		Applications: pulumi.StringArray{
			pulumi.String("string"),
		},
		DestinationAddresses: pulumi.StringArray{
			pulumi.String("string"),
		},
		Services: pulumi.StringArray{
			pulumi.String("string"),
		},
		SourceAddresses: pulumi.StringArray{
			pulumi.String("string"),
		},
		Urls: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	NetworkFirewallPolicyId: pulumi.String("string"),
	Inspection:              pulumi.String("string"),
	Name:                    pulumi.String("string"),
	Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
		&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
			AfterRule:  pulumi.String("string"),
			BeforeRule: pulumi.String("string"),
		},
	},
	PriorityOrder: pulumi.String("string"),
})
var networkFirewallPolicySecurityRuleResource = new NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", NetworkFirewallPolicySecurityRuleArgs.builder()
    .action("string")
    .condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
        .applications("string")
        .destinationAddresses("string")
        .services("string")
        .sourceAddresses("string")
        .urls("string")
        .build())
    .networkFirewallPolicyId("string")
    .inspection("string")
    .name("string")
    .positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
        .afterRule("string")
        .beforeRule("string")
        .build())
    .priorityOrder("string")
    .build());
network_firewall_policy_security_rule_resource = oci.network_firewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource",
    action="string",
    condition={
        "applications": ["string"],
        "destination_addresses": ["string"],
        "services": ["string"],
        "source_addresses": ["string"],
        "urls": ["string"],
    },
    network_firewall_policy_id="string",
    inspection="string",
    name="string",
    positions=[{
        "after_rule": "string",
        "before_rule": "string",
    }],
    priority_order="string")
const networkFirewallPolicySecurityRuleResource = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", {
    action: "string",
    condition: {
        applications: ["string"],
        destinationAddresses: ["string"],
        services: ["string"],
        sourceAddresses: ["string"],
        urls: ["string"],
    },
    networkFirewallPolicyId: "string",
    inspection: "string",
    name: "string",
    positions: [{
        afterRule: "string",
        beforeRule: "string",
    }],
    priorityOrder: "string",
});
type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
properties:
    action: string
    condition:
        applications:
            - string
        destinationAddresses:
            - string
        services:
            - string
        sourceAddresses:
            - string
        urls:
            - string
    inspection: string
    name: string
    networkFirewallPolicyId: string
    positions:
        - afterRule: string
          beforeRule: string
    priorityOrder: string
NetworkFirewallPolicySecurityRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The NetworkFirewallPolicySecurityRule resource accepts the following input properties:
- Action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Condition
NetworkFirewall Policy Security Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- Positions
List<NetworkFirewall Policy Security Rule Position> 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- PriorityOrder string
- Action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Condition
NetworkFirewall Policy Security Rule Condition Args 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- Positions
[]NetworkFirewall Policy Security Rule Position Args 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- PriorityOrder string
- action String
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
PolicySecurity Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- positions
List<PolicySecurity Rule Position> 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder String
- action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
NetworkFirewall Policy Security Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- networkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name string
- Name for the Security rule, must be unique within the policy.
- positions
NetworkFirewall Policy Security Rule Position[] 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder string
- action str
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
NetworkFirewall Policy Security Rule Condition Args 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- network_firewall_ strpolicy_ id 
- Unique Network Firewall Policy identifier
- inspection str
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name str
- Name for the Security rule, must be unique within the policy.
- positions
Sequence[NetworkFirewall Policy Security Rule Position Args] 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority_order str
- action String
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition Property Map
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- positions List<Property Map>
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder String
Outputs
All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicySecurityRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- Id string
- The provider-assigned unique ID for this managed resource.
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- id String
- The provider-assigned unique ID for this managed resource.
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- id string
- The provider-assigned unique ID for this managed resource.
- parentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- id str
- The provider-assigned unique ID for this managed resource.
- parent_resource_ strid 
- OCID of the Network Firewall Policy this security rule belongs to.
- id String
- The provider-assigned unique ID for this managed resource.
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
Look up Existing NetworkFirewallPolicySecurityRule Resource
Get an existing NetworkFirewallPolicySecurityRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicySecurityRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicySecurityRule@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        action: Optional[str] = None,
        condition: Optional[NetworkFirewallPolicySecurityRuleConditionArgs] = None,
        inspection: Optional[str] = None,
        name: Optional[str] = None,
        network_firewall_policy_id: Optional[str] = None,
        parent_resource_id: Optional[str] = None,
        positions: Optional[Sequence[NetworkFirewallPolicySecurityRulePositionArgs]] = None,
        priority_order: Optional[str] = None) -> NetworkFirewallPolicySecurityRulefunc GetNetworkFirewallPolicySecurityRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicySecurityRuleState, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)public static NetworkFirewallPolicySecurityRule Get(string name, Input<string> id, NetworkFirewallPolicySecurityRuleState? state, CustomResourceOptions? opts = null)public static NetworkFirewallPolicySecurityRule get(String name, Output<String> id, NetworkFirewallPolicySecurityRuleState state, CustomResourceOptions options)resources:  _:    type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Condition
NetworkFirewall Policy Security Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- Positions
List<NetworkFirewall Policy Security Rule Position> 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- PriorityOrder string
- Action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- Condition
NetworkFirewall Policy Security Rule Condition Args 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- Name string
- Name for the Security rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- ParentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- Positions
[]NetworkFirewall Policy Security Rule Position Args 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- PriorityOrder string
- action String
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
PolicySecurity Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
List<PolicySecurity Rule Position> 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder String
- action string
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
NetworkFirewall Policy Security Rule Condition 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name string
- Name for the Security rule, must be unique within the policy.
- networkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource stringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
NetworkFirewall Policy Security Rule Position[] 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder string
- action str
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition
NetworkFirewall Policy Security Rule Condition Args 
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection str
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name str
- Name for the Security rule, must be unique within the policy.
- network_firewall_ strpolicy_ id 
- Unique Network Firewall Policy identifier
- parent_resource_ strid 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions
Sequence[NetworkFirewall Policy Security Rule Position Args] 
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority_order str
- action String
- (Updatable) Types of Action on the Traffic flow.- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
 
- condition Property Map
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
 
- name String
- Name for the Security rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource StringId 
- OCID of the Network Firewall Policy this security rule belongs to.
- positions List<Property Map>
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priorityOrder String
Supporting Types
NetworkFirewallPolicySecurityRuleCondition, NetworkFirewallPolicySecurityRuleConditionArgs            
- Applications List<string>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- DestinationAddresses List<string>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Services List<string>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- SourceAddresses List<string>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- Urls List<string>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- Applications []string
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- DestinationAddresses []string
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Services []string
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- SourceAddresses []string
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- Urls []string
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services List<String>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls List<String>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications string[]
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses string[]
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services string[]
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses string[]
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls string[]
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications Sequence[str]
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination_addresses Sequence[str]
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services Sequence[str]
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source_addresses Sequence[str]
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls Sequence[str]
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destinationAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services List<String>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- sourceAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls List<String>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
NetworkFirewallPolicySecurityRulePosition, NetworkFirewallPolicySecurityRulePositionArgs            
- AfterRule string
- (Updatable) Identifier for rule after which this rule lies.
- BeforeRule string
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- AfterRule string
- (Updatable) Identifier for rule after which this rule lies.
- BeforeRule string
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- afterRule String
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule String
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- afterRule string
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule string
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- after_rule str
- (Updatable) Identifier for rule after which this rule lies.
- before_rule str
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- afterRule String
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule String
- (Updatable) Identifier for rule before which this rule lies. - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
Import
NetworkFirewallPolicySecurityRules can be imported using the name, e.g.
$ pulumi import oci:NetworkFirewall/networkFirewallPolicySecurityRule:NetworkFirewallPolicySecurityRule test_network_firewall_policy_security_rule "networkFirewallPolicies/{networkFirewallPolicyId}/securityRules/{securityRuleName}"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.