oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule
Explore with Pulumi AI
This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Creates a new tunnel inspection rule for the network firewall policy.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkFirewallPolicyTunnelInspectionRule = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", {
    condition: {
        destinationAddresses: networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
        sourceAddresses: networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
    },
    name: networkFirewallPolicyTunnelInspectionRuleName,
    networkFirewallPolicyId: testNetworkFirewallPolicy.id,
    protocol: networkFirewallPolicyTunnelInspectionRuleProtocol,
    action: networkFirewallPolicyTunnelInspectionRuleAction,
    position: {
        afterRule: networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
        beforeRule: networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
    },
    profile: {
        mustReturnTrafficToSource: networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
    },
});
import pulumi
import pulumi_oci as oci
test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
    condition={
        "destination_addresses": network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
        "source_addresses": network_firewall_policy_tunnel_inspection_rule_condition_source_address,
    },
    name=network_firewall_policy_tunnel_inspection_rule_name,
    network_firewall_policy_id=test_network_firewall_policy["id"],
    protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
    action=network_firewall_policy_tunnel_inspection_rule_action,
    position={
        "after_rule": network_firewall_policy_tunnel_inspection_rule_position_after_rule,
        "before_rule": network_firewall_policy_tunnel_inspection_rule_position_before_rule,
    },
    profile={
        "must_return_traffic_to_source": network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
    })
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/networkfirewall"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := networkfirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "test_network_firewall_policy_tunnel_inspection_rule", &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
			Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
				DestinationAddresses: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress),
				SourceAddresses:      pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress),
			},
			Name:                    pulumi.Any(networkFirewallPolicyTunnelInspectionRuleName),
			NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
			Protocol:                pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProtocol),
			Action:                  pulumi.Any(networkFirewallPolicyTunnelInspectionRuleAction),
			Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
				AfterRule:  pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionAfterRule),
				BeforeRule: pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule),
			},
			Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
				MustReturnTrafficToSource: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testNetworkFirewallPolicyTunnelInspectionRule = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", new()
    {
        Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
        {
            DestinationAddresses = networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
            SourceAddresses = networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
        },
        Name = networkFirewallPolicyTunnelInspectionRuleName,
        NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
        Protocol = networkFirewallPolicyTunnelInspectionRuleProtocol,
        Action = networkFirewallPolicyTunnelInspectionRuleAction,
        Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
        {
            AfterRule = networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
            BeforeRule = networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
        },
        Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
        {
            MustReturnTrafficToSource = networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var testNetworkFirewallPolicyTunnelInspectionRule = new NetworkFirewallPolicyTunnelInspectionRule("testNetworkFirewallPolicyTunnelInspectionRule", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
            .condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
                .destinationAddresses(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress)
                .sourceAddresses(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress)
                .build())
            .name(networkFirewallPolicyTunnelInspectionRuleName)
            .networkFirewallPolicyId(testNetworkFirewallPolicy.id())
            .protocol(networkFirewallPolicyTunnelInspectionRuleProtocol)
            .action(networkFirewallPolicyTunnelInspectionRuleAction)
            .position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
                .afterRule(networkFirewallPolicyTunnelInspectionRulePositionAfterRule)
                .beforeRule(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule)
                .build())
            .profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
                .mustReturnTrafficToSource(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource)
                .build())
            .build());
    }
}
resources:
  testNetworkFirewallPolicyTunnelInspectionRule:
    type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
    name: test_network_firewall_policy_tunnel_inspection_rule
    properties:
      condition:
        destinationAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress}
        sourceAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress}
      name: ${networkFirewallPolicyTunnelInspectionRuleName}
      networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
      protocol: ${networkFirewallPolicyTunnelInspectionRuleProtocol}
      action: ${networkFirewallPolicyTunnelInspectionRuleAction}
      position:
        afterRule: ${networkFirewallPolicyTunnelInspectionRulePositionAfterRule}
        beforeRule: ${networkFirewallPolicyTunnelInspectionRulePositionBeforeRule}
      profile:
        mustReturnTrafficToSource: ${networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource}
Create NetworkFirewallPolicyTunnelInspectionRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NetworkFirewallPolicyTunnelInspectionRule(name: string, args: NetworkFirewallPolicyTunnelInspectionRuleArgs, opts?: CustomResourceOptions);@overload
def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
                                              args: NetworkFirewallPolicyTunnelInspectionRuleArgs,
                                              opts: Optional[ResourceOptions] = None)
@overload
def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
                                              opts: Optional[ResourceOptions] = None,
                                              condition: Optional[NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
                                              network_firewall_policy_id: Optional[str] = None,
                                              protocol: Optional[str] = None,
                                              action: Optional[str] = None,
                                              name: Optional[str] = None,
                                              position: Optional[NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
                                              profile: Optional[NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None)func NewNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, args NetworkFirewallPolicyTunnelInspectionRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)public NetworkFirewallPolicyTunnelInspectionRule(string name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions? opts = null)
public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args)
public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions options)
type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var networkFirewallPolicyTunnelInspectionRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", new()
{
    Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
    {
        DestinationAddresses = new[]
        {
            "string",
        },
        SourceAddresses = new[]
        {
            "string",
        },
    },
    NetworkFirewallPolicyId = "string",
    Protocol = "string",
    Action = "string",
    Name = "string",
    Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
    {
        AfterRule = "string",
        BeforeRule = "string",
    },
    Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
    {
        MustReturnTrafficToSource = false,
    },
});
example, err := networkfirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "networkFirewallPolicyTunnelInspectionRuleResource", &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
	Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
		DestinationAddresses: pulumi.StringArray{
			pulumi.String("string"),
		},
		SourceAddresses: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	NetworkFirewallPolicyId: pulumi.String("string"),
	Protocol:                pulumi.String("string"),
	Action:                  pulumi.String("string"),
	Name:                    pulumi.String("string"),
	Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
		AfterRule:  pulumi.String("string"),
		BeforeRule: pulumi.String("string"),
	},
	Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
		MustReturnTrafficToSource: pulumi.Bool(false),
	},
})
var networkFirewallPolicyTunnelInspectionRuleResource = new NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
    .condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
        .destinationAddresses("string")
        .sourceAddresses("string")
        .build())
    .networkFirewallPolicyId("string")
    .protocol("string")
    .action("string")
    .name("string")
    .position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
        .afterRule("string")
        .beforeRule("string")
        .build())
    .profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
        .mustReturnTrafficToSource(false)
        .build())
    .build());
network_firewall_policy_tunnel_inspection_rule_resource = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource",
    condition={
        "destination_addresses": ["string"],
        "source_addresses": ["string"],
    },
    network_firewall_policy_id="string",
    protocol="string",
    action="string",
    name="string",
    position={
        "after_rule": "string",
        "before_rule": "string",
    },
    profile={
        "must_return_traffic_to_source": False,
    })
const networkFirewallPolicyTunnelInspectionRuleResource = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", {
    condition: {
        destinationAddresses: ["string"],
        sourceAddresses: ["string"],
    },
    networkFirewallPolicyId: "string",
    protocol: "string",
    action: "string",
    name: "string",
    position: {
        afterRule: "string",
        beforeRule: "string",
    },
    profile: {
        mustReturnTrafficToSource: false,
    },
});
type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
properties:
    action: string
    condition:
        destinationAddresses:
            - string
        sourceAddresses:
            - string
    name: string
    networkFirewallPolicyId: string
    position:
        afterRule: string
        beforeRule: string
    profile:
        mustReturnTrafficToSource: false
    protocol: string
NetworkFirewallPolicyTunnelInspectionRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The NetworkFirewallPolicyTunnelInspectionRule resource accepts the following input properties:
- Condition
NetworkFirewall Policy Tunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- Protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Position
NetworkFirewall Policy Tunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- Profile
NetworkFirewall Policy Tunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Condition
NetworkFirewall Policy Tunnel Inspection Rule Condition Args 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- Protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Position
NetworkFirewall Policy Tunnel Inspection Rule Position Args 
- (Updatable) An object which defines the position of the rule.
- Profile
NetworkFirewall Policy Tunnel Inspection Rule Profile Args 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
PolicyTunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- protocol String
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action String
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
PolicyTunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- profile
PolicyTunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
NetworkFirewall Policy Tunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- networkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
NetworkFirewall Policy Tunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- profile
NetworkFirewall Policy Tunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
NetworkFirewall Policy Tunnel Inspection Rule Condition Args 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- network_firewall_ strpolicy_ id 
- Unique Network Firewall Policy identifier
- protocol str
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action str
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- name str
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
NetworkFirewall Policy Tunnel Inspection Rule Position Args 
- (Updatable) An object which defines the position of the rule.
- profile
NetworkFirewall Policy Tunnel Inspection Rule Profile Args 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition Property Map
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- protocol String
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action String
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position Property Map
- (Updatable) An object which defines the position of the rule.
- profile Property Map
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
Outputs
All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicyTunnelInspectionRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- ParentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- PriorityOrder string
- The priority order in which this rule should be evaluated
- Id string
- The provider-assigned unique ID for this managed resource.
- ParentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- PriorityOrder string
- The priority order in which this rule should be evaluated
- id String
- The provider-assigned unique ID for this managed resource.
- parentResource StringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priorityOrder String
- The priority order in which this rule should be evaluated
- id string
- The provider-assigned unique ID for this managed resource.
- parentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priorityOrder string
- The priority order in which this rule should be evaluated
- id str
- The provider-assigned unique ID for this managed resource.
- parent_resource_ strid 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priority_order str
- The priority order in which this rule should be evaluated
- id String
- The provider-assigned unique ID for this managed resource.
- parentResource StringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priorityOrder String
- The priority order in which this rule should be evaluated
Look up Existing NetworkFirewallPolicyTunnelInspectionRule Resource
Get an existing NetworkFirewallPolicyTunnelInspectionRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicyTunnelInspectionRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicyTunnelInspectionRule@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        action: Optional[str] = None,
        condition: Optional[NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
        name: Optional[str] = None,
        network_firewall_policy_id: Optional[str] = None,
        parent_resource_id: Optional[str] = None,
        position: Optional[NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
        priority_order: Optional[str] = None,
        profile: Optional[NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None,
        protocol: Optional[str] = None) -> NetworkFirewallPolicyTunnelInspectionRulefunc GetNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicyTunnelInspectionRuleState, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)public static NetworkFirewallPolicyTunnelInspectionRule Get(string name, Input<string> id, NetworkFirewallPolicyTunnelInspectionRuleState? state, CustomResourceOptions? opts = null)public static NetworkFirewallPolicyTunnelInspectionRule get(String name, Output<String> id, NetworkFirewallPolicyTunnelInspectionRuleState state, CustomResourceOptions options)resources:  _:    type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- Condition
NetworkFirewall Policy Tunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- ParentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Position
NetworkFirewall Policy Tunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- PriorityOrder string
- The priority order in which this rule should be evaluated
- Profile
NetworkFirewall Policy Tunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- Condition
NetworkFirewall Policy Tunnel Inspection Rule Condition Args 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- NetworkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- ParentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Position
NetworkFirewall Policy Tunnel Inspection Rule Position Args 
- (Updatable) An object which defines the position of the rule.
- PriorityOrder string
- The priority order in which this rule should be evaluated
- Profile
NetworkFirewall Policy Tunnel Inspection Rule Profile Args 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action String
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- condition
PolicyTunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource StringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
PolicyTunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- priorityOrder String
- The priority order in which this rule should be evaluated
- profile
PolicyTunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol String
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action string
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- condition
NetworkFirewall Policy Tunnel Inspection Rule Condition 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- networkFirewall stringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource stringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
NetworkFirewall Policy Tunnel Inspection Rule Position 
- (Updatable) An object which defines the position of the rule.
- priorityOrder string
- The priority order in which this rule should be evaluated
- profile
NetworkFirewall Policy Tunnel Inspection Rule Profile 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol string
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action str
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- condition
NetworkFirewall Policy Tunnel Inspection Rule Condition Args 
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name str
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- network_firewall_ strpolicy_ id 
- Unique Network Firewall Policy identifier
- parent_resource_ strid 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
NetworkFirewall Policy Tunnel Inspection Rule Position Args 
- (Updatable) An object which defines the position of the rule.
- priority_order str
- The priority order in which this rule should be evaluated
- profile
NetworkFirewall Policy Tunnel Inspection Rule Profile Args 
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol str
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
- action String
- (Updatable) Types of Inspect Action on the traffic flow.- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
 
- condition Property Map
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- networkFirewall StringPolicy Id 
- Unique Network Firewall Policy identifier
- parentResource StringId 
- OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position Property Map
- (Updatable) An object which defines the position of the rule.
- priorityOrder String
- The priority order in which this rule should be evaluated
- profile Property Map
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol String
- (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic. - VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
 - ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values 
Supporting Types
NetworkFirewallPolicyTunnelInspectionRuleCondition, NetworkFirewallPolicyTunnelInspectionRuleConditionArgs              
- DestinationAddresses List<string>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- SourceAddresses List<string>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- DestinationAddresses []string
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- SourceAddresses []string
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- destinationAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- sourceAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- destinationAddresses string[]
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- sourceAddresses string[]
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- destination_addresses Sequence[str]
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- source_addresses Sequence[str]
- (Updatable) An array of address list names to be evaluated against the traffic source address.
- destinationAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic destination address.
- sourceAddresses List<String>
- (Updatable) An array of address list names to be evaluated against the traffic source address.
NetworkFirewallPolicyTunnelInspectionRulePosition, NetworkFirewallPolicyTunnelInspectionRulePositionArgs              
- AfterRule string
- (Updatable) Identifier for rule after which this rule lies.
- BeforeRule string
- (Updatable) Identifier for rule before which this rule lies.
- AfterRule string
- (Updatable) Identifier for rule after which this rule lies.
- BeforeRule string
- (Updatable) Identifier for rule before which this rule lies.
- afterRule String
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule String
- (Updatable) Identifier for rule before which this rule lies.
- afterRule string
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule string
- (Updatable) Identifier for rule before which this rule lies.
- after_rule str
- (Updatable) Identifier for rule after which this rule lies.
- before_rule str
- (Updatable) Identifier for rule before which this rule lies.
- afterRule String
- (Updatable) Identifier for rule after which this rule lies.
- beforeRule String
- (Updatable) Identifier for rule before which this rule lies.
NetworkFirewallPolicyTunnelInspectionRuleProfile, NetworkFirewallPolicyTunnelInspectionRuleProfileArgs              
- MustReturn boolTraffic To Source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
- MustReturn boolTraffic To Source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
- mustReturn BooleanTraffic To Source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
- mustReturn booleanTraffic To Source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
- must_return_ booltraffic_ to_ source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
- mustReturn BooleanTraffic To Source 
- (Updatable) Return scanned VXLAN tunnel traffic to source.
Import
NetworkFirewallPolicyTunnelInspectionRules can be imported using the id, e.g.
$ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.