aviatrix.AviatrixFirewallPolicy
Explore with Pulumi AI
Import
firewall_policy can be imported using the gw_name
, src_ip
, dst_ip
, protocol
, port
and action
separated by ~
, e.g.
$ pulumi import aviatrix:index/aviatrixFirewallPolicy:AviatrixFirewallPolicy test "gw_name~src_ip~dst_ip~protocol~port~action"
Example Usage
using System.Collections.Generic;
using Pulumi;
using Aviatrix = Pulumi.Aviatrix;
return await Deployment.RunAsync(() =>
{
// Create an Aviatrix Stateful Firewall Policy
var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
{
GwName = aviatrix_firewall.Test_firewall.Gw_name,
SrcIp = "10.15.0.224/32",
DstIp = "10.12.0.172/32",
Protocol = "tcp",
Port = "0:65535",
Action = "allow",
LogEnabled = true,
Description = "Test policy.",
});
});
package main
import (
"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
GwName: pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
SrcIp: pulumi.String("10.15.0.224/32"),
DstIp: pulumi.String("10.12.0.172/32"),
Protocol: pulumi.String("tcp"),
Port: pulumi.String("0:65535"),
Action: pulumi.String("allow"),
LogEnabled: pulumi.Bool(true),
Description: pulumi.String("Test policy."),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aviatrix.AviatrixFirewallPolicy;
import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()
.gwName(aviatrix_firewall.test_firewall().gw_name())
.srcIp("10.15.0.224/32")
.dstIp("10.12.0.172/32")
.protocol("tcp")
.port("0:65535")
.action("allow")
.logEnabled(true)
.description("Test policy.")
.build());
}
}
import pulumi
import pulumi_aviatrix as aviatrix
# Create an Aviatrix Stateful Firewall Policy
test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
src_ip="10.15.0.224/32",
dst_ip="10.12.0.172/32",
protocol="tcp",
port="0:65535",
action="allow",
log_enabled=True,
description="Test policy.")
import * as pulumi from "@pulumi/pulumi";
import * as aviatrix from "@astipkovits/aviatrix";
// Create an Aviatrix Stateful Firewall Policy
const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
gwName: aviatrix_firewall.test_firewall.gw_name,
srcIp: "10.15.0.224/32",
dstIp: "10.12.0.172/32",
protocol: "tcp",
port: "0:65535",
action: "allow",
logEnabled: true,
description: "Test policy.",
});
resources:
# Create an Aviatrix Stateful Firewall Policy
testFirewallPolicy:
type: aviatrix:AviatrixFirewallPolicy
properties:
gwName: ${aviatrix_firewall.test_firewall.gw_name}
srcIp: 10.15.0.224/32
dstIp: 10.12.0.172/32
protocol: tcp
port: 0:65535
action: allow
logEnabled: true
description: Test policy.
using System.Collections.Generic;
using Pulumi;
using Aviatrix = Pulumi.Aviatrix;
return await Deployment.RunAsync(() =>
{
// Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
{
GwName = aviatrix_firewall.Test_firewall.Gw_name,
SrcIp = "10.15.0.225/32",
DstIp = "10.12.0.173/32",
Protocol = "tcp",
Port = "0:65535",
Action = "allow",
LogEnabled = true,
Description = "Test policy.",
Position = 2,
});
});
package main
import (
"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
GwName: pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
SrcIp: pulumi.String("10.15.0.225/32"),
DstIp: pulumi.String("10.12.0.173/32"),
Protocol: pulumi.String("tcp"),
Port: pulumi.String("0:65535"),
Action: pulumi.String("allow"),
LogEnabled: pulumi.Bool(true),
Description: pulumi.String("Test policy."),
Position: pulumi.Int(2),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aviatrix.AviatrixFirewallPolicy;
import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()
.gwName(aviatrix_firewall.test_firewall().gw_name())
.srcIp("10.15.0.225/32")
.dstIp("10.12.0.173/32")
.protocol("tcp")
.port("0:65535")
.action("allow")
.logEnabled(true)
.description("Test policy.")
.position(2)
.build());
}
}
import pulumi
import pulumi_aviatrix as aviatrix
# Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
src_ip="10.15.0.225/32",
dst_ip="10.12.0.173/32",
protocol="tcp",
port="0:65535",
action="allow",
log_enabled=True,
description="Test policy.",
position=2)
import * as pulumi from "@pulumi/pulumi";
import * as aviatrix from "@astipkovits/aviatrix";
// Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
gwName: aviatrix_firewall.test_firewall.gw_name,
srcIp: "10.15.0.225/32",
dstIp: "10.12.0.173/32",
protocol: "tcp",
port: "0:65535",
action: "allow",
logEnabled: true,
description: "Test policy.",
position: 2,
});
resources:
# Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
testFirewallPolicy:
type: aviatrix:AviatrixFirewallPolicy
properties:
gwName: ${aviatrix_firewall.test_firewall.gw_name}
srcIp: 10.15.0.225/32
dstIp: 10.12.0.173/32
protocol: tcp
port: 0:65535
action: allow
logEnabled: true
description: Test policy.
position: 2
Create AviatrixFirewallPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AviatrixFirewallPolicy(name: string, args: AviatrixFirewallPolicyArgs, opts?: CustomResourceOptions);
@overload
def AviatrixFirewallPolicy(resource_name: str,
args: AviatrixFirewallPolicyInitArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AviatrixFirewallPolicy(resource_name: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
dst_ip: Optional[str] = None,
gw_name: Optional[str] = None,
port: Optional[str] = None,
src_ip: Optional[str] = None,
description: Optional[str] = None,
log_enabled: Optional[bool] = None,
position: Optional[int] = None,
protocol: Optional[str] = None)
func NewAviatrixFirewallPolicy(ctx *Context, name string, args AviatrixFirewallPolicyArgs, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
public AviatrixFirewallPolicy(string name, AviatrixFirewallPolicyArgs args, CustomResourceOptions? opts = null)
public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args)
public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args, CustomResourceOptions options)
type: aviatrix:AviatrixFirewallPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AviatrixFirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AviatrixFirewallPolicyInitArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AviatrixFirewallPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AviatrixFirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AviatrixFirewallPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var aviatrixFirewallPolicyResource = new Aviatrix.AviatrixFirewallPolicy("aviatrixFirewallPolicyResource", new()
{
Action = "string",
DstIp = "string",
GwName = "string",
Port = "string",
SrcIp = "string",
Description = "string",
LogEnabled = false,
Position = 0,
Protocol = "string",
});
example, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "aviatrixFirewallPolicyResource", &aviatrix.AviatrixFirewallPolicyArgs{
Action: pulumi.String("string"),
DstIp: pulumi.String("string"),
GwName: pulumi.String("string"),
Port: pulumi.String("string"),
SrcIp: pulumi.String("string"),
Description: pulumi.String("string"),
LogEnabled: pulumi.Bool(false),
Position: pulumi.Int(0),
Protocol: pulumi.String("string"),
})
var aviatrixFirewallPolicyResource = new AviatrixFirewallPolicy("aviatrixFirewallPolicyResource", AviatrixFirewallPolicyArgs.builder()
.action("string")
.dstIp("string")
.gwName("string")
.port("string")
.srcIp("string")
.description("string")
.logEnabled(false)
.position(0)
.protocol("string")
.build());
aviatrix_firewall_policy_resource = aviatrix.AviatrixFirewallPolicy("aviatrixFirewallPolicyResource",
action="string",
dst_ip="string",
gw_name="string",
port="string",
src_ip="string",
description="string",
log_enabled=False,
position=0,
protocol="string")
const aviatrixFirewallPolicyResource = new aviatrix.AviatrixFirewallPolicy("aviatrixFirewallPolicyResource", {
action: "string",
dstIp: "string",
gwName: "string",
port: "string",
srcIp: "string",
description: "string",
logEnabled: false,
position: 0,
protocol: "string",
});
type: aviatrix:AviatrixFirewallPolicy
properties:
action: string
description: string
dstIp: string
gwName: string
logEnabled: false
port: string
position: 0
protocol: string
srcIp: string
AviatrixFirewallPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AviatrixFirewallPolicy resource accepts the following input properties:
- Action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- Dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Gw
Name string - Gateway name to attach firewall policy to.
- Port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- Src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Description string
- Description of the policy. Example: "This is policy no.1".
- Log
Enabled bool - Valid values: true, false. Default value: false.
- Position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- Protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- Action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- Dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Gw
Name string - Gateway name to attach firewall policy to.
- Port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- Src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Description string
- Description of the policy. Example: "This is policy no.1".
- Log
Enabled bool - Valid values: true, false. Default value: false.
- Position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- Protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- action String
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- dst
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name String - Gateway name to attach firewall policy to.
- port String
- A single port or a range of port numbers. Example: "25", "25:1024".
- src
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- description String
- Description of the policy. Example: "This is policy no.1".
- log
Enabled Boolean - Valid values: true, false. Default value: false.
- position Integer
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol String
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name string - Gateway name to attach firewall policy to.
- port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- description string
- Description of the policy. Example: "This is policy no.1".
- log
Enabled boolean - Valid values: true, false. Default value: false.
- position number
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- action str
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- dst_
ip str - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw_
name str - Gateway name to attach firewall policy to.
- port str
- A single port or a range of port numbers. Example: "25", "25:1024".
- src_
ip str - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- description str
- Description of the policy. Example: "This is policy no.1".
- log_
enabled bool - Valid values: true, false. Default value: false.
- position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol str
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- action String
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- dst
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name String - Gateway name to attach firewall policy to.
- port String
- A single port or a range of port numbers. Example: "25", "25:1024".
- src
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- description String
- Description of the policy. Example: "This is policy no.1".
- log
Enabled Boolean - Valid values: true, false. Default value: false.
- position Number
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol String
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
Outputs
All input properties are implicitly available as output properties. Additionally, the AviatrixFirewallPolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing AviatrixFirewallPolicy Resource
Get an existing AviatrixFirewallPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AviatrixFirewallPolicyState, opts?: CustomResourceOptions): AviatrixFirewallPolicy
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
description: Optional[str] = None,
dst_ip: Optional[str] = None,
gw_name: Optional[str] = None,
log_enabled: Optional[bool] = None,
port: Optional[str] = None,
position: Optional[int] = None,
protocol: Optional[str] = None,
src_ip: Optional[str] = None) -> AviatrixFirewallPolicy
func GetAviatrixFirewallPolicy(ctx *Context, name string, id IDInput, state *AviatrixFirewallPolicyState, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
public static AviatrixFirewallPolicy Get(string name, Input<string> id, AviatrixFirewallPolicyState? state, CustomResourceOptions? opts = null)
public static AviatrixFirewallPolicy get(String name, Output<String> id, AviatrixFirewallPolicyState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- Description string
- Description of the policy. Example: "This is policy no.1".
- Dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Gw
Name string - Gateway name to attach firewall policy to.
- Log
Enabled bool - Valid values: true, false. Default value: false.
- Port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- Position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- Protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- Src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- Description string
- Description of the policy. Example: "This is policy no.1".
- Dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- Gw
Name string - Gateway name to attach firewall policy to.
- Log
Enabled bool - Valid values: true, false. Default value: false.
- Port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- Position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- Protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- Src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- action String
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- description String
- Description of the policy. Example: "This is policy no.1".
- dst
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name String - Gateway name to attach firewall policy to.
- log
Enabled Boolean - Valid values: true, false. Default value: false.
- port String
- A single port or a range of port numbers. Example: "25", "25:1024".
- position Integer
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol String
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- src
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- action string
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- description string
- Description of the policy. Example: "This is policy no.1".
- dst
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name string - Gateway name to attach firewall policy to.
- log
Enabled boolean - Valid values: true, false. Default value: false.
- port string
- A single port or a range of port numbers. Example: "25", "25:1024".
- position number
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol string
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- src
Ip string - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- action str
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- description str
- Description of the policy. Example: "This is policy no.1".
- dst_
ip str - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw_
name str - Gateway name to attach firewall policy to.
- log_
enabled bool - Valid values: true, false. Default value: false.
- port str
- A single port or a range of port numbers. Example: "25", "25:1024".
- position int
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol str
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- src_
ip str - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- action String
- Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
- description String
- Description of the policy. Example: "This is policy no.1".
- dst
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
- gw
Name String - Gateway name to attach firewall policy to.
- log
Enabled Boolean - Valid values: true, false. Default value: false.
- port String
- A single port or a range of port numbers. Example: "25", "25:1024".
- position Number
- Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
- protocol String
- : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
- src
Ip String - CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
Package Details
- Repository
- aviatrix astipkovits/pulumi-aviatrix
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
aviatrix
Terraform Provider.