meraki.networks.ApplianceFirewallInboundFirewallRules
Explore with Pulumi AI
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.networks.ApplianceFirewallInboundFirewallRules;
import com.pulumi.meraki.networks.ApplianceFirewallInboundFirewallRulesArgs;
import com.pulumi.meraki.networks.inputs.ApplianceFirewallInboundFirewallRulesRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ApplianceFirewallInboundFirewallRules("example", ApplianceFirewallInboundFirewallRulesArgs.builder()
.networkId("string")
.rules(ApplianceFirewallInboundFirewallRulesRuleArgs.builder()
.comment("Allow TCP traffic to subnet with HTTP servers.")
.dest_cidr("192.168.1.0/24")
.dest_port("443")
.policy("allow")
.protocol("tcp")
.src_cidr("Any")
.src_port("Any")
.syslog_enabled(false)
.build())
.syslogDefaultRule(true)
.build());
ctx.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example);
}
}
resources:
example:
type: meraki:networks:ApplianceFirewallInboundFirewallRules
properties:
networkId: string
rules:
- comment: Allow TCP traffic to subnet with HTTP servers.
dest_cidr: 192.168.1.0/24
dest_port: '443'
policy: allow
protocol: tcp
src_cidr: Any
src_port: Any
syslog_enabled: false
syslogDefaultRule: true
outputs:
merakiNetworksApplianceFirewallInboundFirewallRulesExample: ${example}
Create ApplianceFirewallInboundFirewallRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ApplianceFirewallInboundFirewallRules(name: string, args: ApplianceFirewallInboundFirewallRulesArgs, opts?: CustomResourceOptions);
@overload
def ApplianceFirewallInboundFirewallRules(resource_name: str,
args: ApplianceFirewallInboundFirewallRulesArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ApplianceFirewallInboundFirewallRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
network_id: Optional[str] = None,
rules: Optional[Sequence[ApplianceFirewallInboundFirewallRulesRuleArgs]] = None,
syslog_default_rule: Optional[bool] = None)
func NewApplianceFirewallInboundFirewallRules(ctx *Context, name string, args ApplianceFirewallInboundFirewallRulesArgs, opts ...ResourceOption) (*ApplianceFirewallInboundFirewallRules, error)
public ApplianceFirewallInboundFirewallRules(string name, ApplianceFirewallInboundFirewallRulesArgs args, CustomResourceOptions? opts = null)
public ApplianceFirewallInboundFirewallRules(String name, ApplianceFirewallInboundFirewallRulesArgs args)
public ApplianceFirewallInboundFirewallRules(String name, ApplianceFirewallInboundFirewallRulesArgs args, CustomResourceOptions options)
type: meraki:networks:ApplianceFirewallInboundFirewallRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ApplianceFirewallInboundFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ApplianceFirewallInboundFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ApplianceFirewallInboundFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ApplianceFirewallInboundFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ApplianceFirewallInboundFirewallRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var applianceFirewallInboundFirewallRulesResource = new Meraki.Networks.ApplianceFirewallInboundFirewallRules("applianceFirewallInboundFirewallRulesResource", new()
{
NetworkId = "string",
Rules = new[]
{
new Meraki.Networks.Inputs.ApplianceFirewallInboundFirewallRulesRuleArgs
{
Comment = "string",
DestCidr = "string",
DestPort = "string",
Policy = "string",
Protocol = "string",
SrcCidr = "string",
SrcPort = "string",
SyslogEnabled = false,
},
},
SyslogDefaultRule = false,
});
example, err := networks.NewApplianceFirewallInboundFirewallRules(ctx, "applianceFirewallInboundFirewallRulesResource", &networks.ApplianceFirewallInboundFirewallRulesArgs{
NetworkId: pulumi.String("string"),
Rules: networks.ApplianceFirewallInboundFirewallRulesRuleArray{
&networks.ApplianceFirewallInboundFirewallRulesRuleArgs{
Comment: pulumi.String("string"),
DestCidr: pulumi.String("string"),
DestPort: pulumi.String("string"),
Policy: pulumi.String("string"),
Protocol: pulumi.String("string"),
SrcCidr: pulumi.String("string"),
SrcPort: pulumi.String("string"),
SyslogEnabled: pulumi.Bool(false),
},
},
SyslogDefaultRule: pulumi.Bool(false),
})
var applianceFirewallInboundFirewallRulesResource = new ApplianceFirewallInboundFirewallRules("applianceFirewallInboundFirewallRulesResource", ApplianceFirewallInboundFirewallRulesArgs.builder()
.networkId("string")
.rules(ApplianceFirewallInboundFirewallRulesRuleArgs.builder()
.comment("string")
.destCidr("string")
.destPort("string")
.policy("string")
.protocol("string")
.srcCidr("string")
.srcPort("string")
.syslogEnabled(false)
.build())
.syslogDefaultRule(false)
.build());
appliance_firewall_inbound_firewall_rules_resource = meraki.networks.ApplianceFirewallInboundFirewallRules("applianceFirewallInboundFirewallRulesResource",
network_id="string",
rules=[{
"comment": "string",
"dest_cidr": "string",
"dest_port": "string",
"policy": "string",
"protocol": "string",
"src_cidr": "string",
"src_port": "string",
"syslog_enabled": False,
}],
syslog_default_rule=False)
const applianceFirewallInboundFirewallRulesResource = new meraki.networks.ApplianceFirewallInboundFirewallRules("applianceFirewallInboundFirewallRulesResource", {
networkId: "string",
rules: [{
comment: "string",
destCidr: "string",
destPort: "string",
policy: "string",
protocol: "string",
srcCidr: "string",
srcPort: "string",
syslogEnabled: false,
}],
syslogDefaultRule: false,
});
type: meraki:networks:ApplianceFirewallInboundFirewallRules
properties:
networkId: string
rules:
- comment: string
destCidr: string
destPort: string
policy: string
protocol: string
srcCidr: string
srcPort: string
syslogEnabled: false
syslogDefaultRule: false
ApplianceFirewallInboundFirewallRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ApplianceFirewallInboundFirewallRules resource accepts the following input properties:
- Network
Id string - networkId path parameter. Network ID
- Rules
List<Appliance
Firewall Inbound Firewall Rules Rule> - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- Network
Id string - networkId path parameter. Network ID
- Rules
[]Appliance
Firewall Inbound Firewall Rules Rule Args - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id String - networkId path parameter. Network ID
- rules
List<Appliance
Firewall Inbound Firewall Rules Rule> - An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id string - networkId path parameter. Network ID
- rules
Appliance
Firewall Inbound Firewall Rules Rule[] - An ordered array of the firewall rules (not including the default rule)
- syslog
Default booleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network_
id str - networkId path parameter. Network ID
- rules
Sequence[Appliance
Firewall Inbound Firewall Rules Rule Args] - An ordered array of the firewall rules (not including the default rule)
- syslog_
default_ boolrule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id String - networkId path parameter. Network ID
- rules List<Property Map>
- An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
Outputs
All input properties are implicitly available as output properties. Additionally, the ApplianceFirewallInboundFirewallRules resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Rules
Responses List<ApplianceFirewall Inbound Firewall Rules Rules Response> - An ordered array of the firewall rules (not including the default rule)
- Id string
- The provider-assigned unique ID for this managed resource.
- Rules
Responses []ApplianceFirewall Inbound Firewall Rules Rules Response - An ordered array of the firewall rules (not including the default rule)
- id String
- The provider-assigned unique ID for this managed resource.
- rules
Responses List<ApplianceFirewall Inbound Firewall Rules Rules Response> - An ordered array of the firewall rules (not including the default rule)
- id string
- The provider-assigned unique ID for this managed resource.
- rules
Responses ApplianceFirewall Inbound Firewall Rules Rules Response[] - An ordered array of the firewall rules (not including the default rule)
- id str
- The provider-assigned unique ID for this managed resource.
- rules_
responses Sequence[ApplianceFirewall Inbound Firewall Rules Rules Response] - An ordered array of the firewall rules (not including the default rule)
- id String
- The provider-assigned unique ID for this managed resource.
- rules
Responses List<Property Map> - An ordered array of the firewall rules (not including the default rule)
Look up Existing ApplianceFirewallInboundFirewallRules Resource
Get an existing ApplianceFirewallInboundFirewallRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ApplianceFirewallInboundFirewallRulesState, opts?: CustomResourceOptions): ApplianceFirewallInboundFirewallRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
network_id: Optional[str] = None,
rules: Optional[Sequence[ApplianceFirewallInboundFirewallRulesRuleArgs]] = None,
rules_responses: Optional[Sequence[ApplianceFirewallInboundFirewallRulesRulesResponseArgs]] = None,
syslog_default_rule: Optional[bool] = None) -> ApplianceFirewallInboundFirewallRules
func GetApplianceFirewallInboundFirewallRules(ctx *Context, name string, id IDInput, state *ApplianceFirewallInboundFirewallRulesState, opts ...ResourceOption) (*ApplianceFirewallInboundFirewallRules, error)
public static ApplianceFirewallInboundFirewallRules Get(string name, Input<string> id, ApplianceFirewallInboundFirewallRulesState? state, CustomResourceOptions? opts = null)
public static ApplianceFirewallInboundFirewallRules get(String name, Output<String> id, ApplianceFirewallInboundFirewallRulesState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Network
Id string - networkId path parameter. Network ID
- Rules
List<Appliance
Firewall Inbound Firewall Rules Rule> - An ordered array of the firewall rules (not including the default rule)
- Rules
Responses List<ApplianceFirewall Inbound Firewall Rules Rules Response> - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- Network
Id string - networkId path parameter. Network ID
- Rules
[]Appliance
Firewall Inbound Firewall Rules Rule Args - An ordered array of the firewall rules (not including the default rule)
- Rules
Responses []ApplianceFirewall Inbound Firewall Rules Rules Response Args - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id String - networkId path parameter. Network ID
- rules
List<Appliance
Firewall Inbound Firewall Rules Rule> - An ordered array of the firewall rules (not including the default rule)
- rules
Responses List<ApplianceFirewall Inbound Firewall Rules Rules Response> - An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id string - networkId path parameter. Network ID
- rules
Appliance
Firewall Inbound Firewall Rules Rule[] - An ordered array of the firewall rules (not including the default rule)
- rules
Responses ApplianceFirewall Inbound Firewall Rules Rules Response[] - An ordered array of the firewall rules (not including the default rule)
- syslog
Default booleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network_
id str - networkId path parameter. Network ID
- rules
Sequence[Appliance
Firewall Inbound Firewall Rules Rule Args] - An ordered array of the firewall rules (not including the default rule)
- rules_
responses Sequence[ApplianceFirewall Inbound Firewall Rules Rules Response Args] - An ordered array of the firewall rules (not including the default rule)
- syslog_
default_ boolrule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- network
Id String - networkId path parameter. Network ID
- rules List<Property Map>
- An ordered array of the firewall rules (not including the default rule)
- rules
Responses List<Property Map> - An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
Supporting Types
ApplianceFirewallInboundFirewallRulesRule, ApplianceFirewallInboundFirewallRulesRuleArgs
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment string
- Description of the rule (optional)
- dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy string
- 'allow' or 'deny' traffic specified by this rule
- protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment str
- Description of the rule (optional)
- dest_
cidr str - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest_
port str - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy str
- 'allow' or 'deny' traffic specified by this rule
- protocol str
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src_
cidr str - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src_
port str - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog_
enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
ApplianceFirewallInboundFirewallRulesRulesResponse, ApplianceFirewallInboundFirewallRulesRulesResponseArgs
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment string
- Description of the rule (optional)
- dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy string
- 'allow' or 'deny' traffic specified by this rule
- protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment str
- Description of the rule (optional)
- dest_
cidr str - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest_
port str - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy str
- 'allow' or 'deny' traffic specified by this rule
- protocol str
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src_
cidr str - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src_
port str - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog_
enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
Import
$ pulumi import meraki:networks/applianceFirewallInboundFirewallRules:ApplianceFirewallInboundFirewallRules example "network_id"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.