Cisco Meraki v0.3.2 published on Tuesday, Sep 24, 2024 by Pulumi
meraki.networks.getApplianceFirewallInboundFirewallRules
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.networks.getApplianceFirewallInboundFirewallRules({
networkId: "string",
});
export const merakiNetworksApplianceFirewallInboundFirewallRulesExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.networks.get_appliance_firewall_inbound_firewall_rules(network_id="string")
pulumi.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.item)
package main
import (
"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := networks.LookupApplianceFirewallInboundFirewallRules(ctx, &networks.LookupApplianceFirewallInboundFirewallRulesArgs{
NetworkId: "string",
}, nil)
if err != nil {
return err
}
ctx.Export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.Item)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() =>
{
var example = Meraki.Networks.GetApplianceFirewallInboundFirewallRules.Invoke(new()
{
NetworkId = "string",
});
return new Dictionary<string, object?>
{
["merakiNetworksApplianceFirewallInboundFirewallRulesExample"] = example.Apply(getApplianceFirewallInboundFirewallRulesResult => getApplianceFirewallInboundFirewallRulesResult.Item),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.networks.NetworksFunctions;
import com.pulumi.meraki.networks.inputs.GetApplianceFirewallInboundFirewallRulesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = NetworksFunctions.getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs.builder()
.networkId("string")
.build());
ctx.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.applyValue(getApplianceFirewallInboundFirewallRulesResult -> getApplianceFirewallInboundFirewallRulesResult.item()));
}
}
variables:
example:
fn::invoke:
Function: meraki:networks:getApplianceFirewallInboundFirewallRules
Arguments:
networkId: string
outputs:
merakiNetworksApplianceFirewallInboundFirewallRulesExample: ${example.item}
Using getApplianceFirewallInboundFirewallRules
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceFirewallInboundFirewallRules(args: GetApplianceFirewallInboundFirewallRulesArgs, opts?: InvokeOptions): Promise<GetApplianceFirewallInboundFirewallRulesResult>
function getApplianceFirewallInboundFirewallRulesOutput(args: GetApplianceFirewallInboundFirewallRulesOutputArgs, opts?: InvokeOptions): Output<GetApplianceFirewallInboundFirewallRulesResult>
def get_appliance_firewall_inbound_firewall_rules(network_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetApplianceFirewallInboundFirewallRulesResult
def get_appliance_firewall_inbound_firewall_rules_output(network_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetApplianceFirewallInboundFirewallRulesResult]
func LookupApplianceFirewallInboundFirewallRules(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesArgs, opts ...InvokeOption) (*LookupApplianceFirewallInboundFirewallRulesResult, error)
func LookupApplianceFirewallInboundFirewallRulesOutput(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesOutputArgs, opts ...InvokeOption) LookupApplianceFirewallInboundFirewallRulesResultOutput
> Note: This function is named LookupApplianceFirewallInboundFirewallRules
in the Go SDK.
public static class GetApplianceFirewallInboundFirewallRules
{
public static Task<GetApplianceFirewallInboundFirewallRulesResult> InvokeAsync(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions? opts = null)
public static Output<GetApplianceFirewallInboundFirewallRulesResult> Invoke(GetApplianceFirewallInboundFirewallRulesInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetApplianceFirewallInboundFirewallRulesResult> getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: meraki:networks/getApplianceFirewallInboundFirewallRules:getApplianceFirewallInboundFirewallRules
arguments:
# arguments dictionary
The following arguments are supported:
- Network
Id string - networkId path parameter. Network ID
- Network
Id string - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
- network
Id string - networkId path parameter. Network ID
- network_
id str - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
getApplianceFirewallInboundFirewallRules Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Firewall Inbound Firewall Rules Item - Network
Id string - networkId path parameter. Network ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Firewall Inbound Firewall Rules Item - Network
Id string - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Firewall Inbound Firewall Rules Item - network
Id String - networkId path parameter. Network ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Firewall Inbound Firewall Rules Item - network
Id string - networkId path parameter. Network ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Firewall Inbound Firewall Rules Item - network_
id str - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- network
Id String - networkId path parameter. Network ID
Supporting Types
GetApplianceFirewallInboundFirewallRulesItem
- Rules
List<Get
Appliance Firewall Inbound Firewall Rules Item Rule> - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- Rules
[]Get
Appliance Firewall Inbound Firewall Rules Item Rule - An ordered array of the firewall rules (not including the default rule)
- Syslog
Default boolRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- rules
List<Get
Appliance Firewall Inbound Firewall Rules Item Rule> - An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- rules
Get
Appliance Firewall Inbound Firewall Rules Item Rule[] - An ordered array of the firewall rules (not including the default rule)
- syslog
Default booleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- rules
Sequence[Get
Appliance Firewall Inbound Firewall Rules Item Rule] - An ordered array of the firewall rules (not including the default rule)
- syslog_
default_ boolrule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
- rules List<Property Map>
- An ordered array of the firewall rules (not including the default rule)
- syslog
Default BooleanRule - Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
GetApplianceFirewallInboundFirewallRulesItemRule
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- Comment string
- Description of the rule (optional)
- Dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- Dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- Policy string
- 'allow' or 'deny' traffic specified by this rule
- Protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- Src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- Src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- Syslog
Enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment string
- Description of the rule (optional)
- dest
Cidr string - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port string - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy string
- 'allow' or 'deny' traffic specified by this rule
- protocol string
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr string - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port string - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment str
- Description of the rule (optional)
- dest_
cidr str - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest_
port str - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy str
- 'allow' or 'deny' traffic specified by this rule
- protocol str
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src_
cidr str - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src_
port str - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog_
enabled bool - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
- comment String
- Description of the rule (optional)
- dest
Cidr String - Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
- dest
Port String - Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
- policy String
- 'allow' or 'deny' traffic specified by this rule
- protocol String
- The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
- src
Cidr String - Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
- src
Port String - Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
- syslog
Enabled Boolean - Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.