1. Packages
  2. Oracle Cloud Infrastructure
  3. API Docs
  4. NetworkFirewall
  5. NetworkFirewallPolicyTunnelInspectionRule
Oracle Cloud Infrastructure v2.17.0 published on Friday, Nov 15, 2024 by Pulumi

oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule

Explore with Pulumi AI

oci logo
Oracle Cloud Infrastructure v2.17.0 published on Friday, Nov 15, 2024 by Pulumi

    This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.

    Creates a new tunnel inspection rule for the network firewall policy.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as oci from "@pulumi/oci";
    
    const testNetworkFirewallPolicyTunnelInspectionRule = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", {
        condition: {
            destinationAddresses: networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
            sourceAddresses: networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
        },
        name: networkFirewallPolicyTunnelInspectionRuleName,
        networkFirewallPolicyId: testNetworkFirewallPolicy.id,
        protocol: networkFirewallPolicyTunnelInspectionRuleProtocol,
        action: networkFirewallPolicyTunnelInspectionRuleAction,
        position: {
            afterRule: networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
            beforeRule: networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
        },
        profile: {
            mustReturnTrafficToSource: networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
        },
    });
    
    import pulumi
    import pulumi_oci as oci
    
    test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
        condition={
            "destination_addresses": network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
            "source_addresses": network_firewall_policy_tunnel_inspection_rule_condition_source_address,
        },
        name=network_firewall_policy_tunnel_inspection_rule_name,
        network_firewall_policy_id=test_network_firewall_policy["id"],
        protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
        action=network_firewall_policy_tunnel_inspection_rule_action,
        position={
            "after_rule": network_firewall_policy_tunnel_inspection_rule_position_after_rule,
            "before_rule": network_firewall_policy_tunnel_inspection_rule_position_before_rule,
        },
        profile={
            "must_return_traffic_to_source": network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/NetworkFirewall"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := NetworkFirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "test_network_firewall_policy_tunnel_inspection_rule", &NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
    			Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
    				DestinationAddresses: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress),
    				SourceAddresses:      pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress),
    			},
    			Name:                    pulumi.Any(networkFirewallPolicyTunnelInspectionRuleName),
    			NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
    			Protocol:                pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProtocol),
    			Action:                  pulumi.Any(networkFirewallPolicyTunnelInspectionRuleAction),
    			Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
    				AfterRule:  pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionAfterRule),
    				BeforeRule: pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule),
    			},
    			Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
    				MustReturnTrafficToSource: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Oci = Pulumi.Oci;
    
    return await Deployment.RunAsync(() => 
    {
        var testNetworkFirewallPolicyTunnelInspectionRule = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", new()
        {
            Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
            {
                DestinationAddresses = networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
                SourceAddresses = networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
            },
            Name = networkFirewallPolicyTunnelInspectionRuleName,
            NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
            Protocol = networkFirewallPolicyTunnelInspectionRuleProtocol,
            Action = networkFirewallPolicyTunnelInspectionRuleAction,
            Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
            {
                AfterRule = networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
                BeforeRule = networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
            },
            Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
            {
                MustReturnTrafficToSource = networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule;
    import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs;
    import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs;
    import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs;
    import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var testNetworkFirewallPolicyTunnelInspectionRule = new NetworkFirewallPolicyTunnelInspectionRule("testNetworkFirewallPolicyTunnelInspectionRule", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
                .condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
                    .destinationAddresses(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress)
                    .sourceAddresses(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress)
                    .build())
                .name(networkFirewallPolicyTunnelInspectionRuleName)
                .networkFirewallPolicyId(testNetworkFirewallPolicy.id())
                .protocol(networkFirewallPolicyTunnelInspectionRuleProtocol)
                .action(networkFirewallPolicyTunnelInspectionRuleAction)
                .position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
                    .afterRule(networkFirewallPolicyTunnelInspectionRulePositionAfterRule)
                    .beforeRule(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule)
                    .build())
                .profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
                    .mustReturnTrafficToSource(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource)
                    .build())
                .build());
    
        }
    }
    
    resources:
      testNetworkFirewallPolicyTunnelInspectionRule:
        type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
        name: test_network_firewall_policy_tunnel_inspection_rule
        properties:
          condition:
            destinationAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress}
            sourceAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress}
          name: ${networkFirewallPolicyTunnelInspectionRuleName}
          networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
          protocol: ${networkFirewallPolicyTunnelInspectionRuleProtocol}
          action: ${networkFirewallPolicyTunnelInspectionRuleAction}
          position:
            afterRule: ${networkFirewallPolicyTunnelInspectionRulePositionAfterRule}
            beforeRule: ${networkFirewallPolicyTunnelInspectionRulePositionBeforeRule}
          profile:
            mustReturnTrafficToSource: ${networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource}
    

    Create NetworkFirewallPolicyTunnelInspectionRule Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new NetworkFirewallPolicyTunnelInspectionRule(name: string, args: NetworkFirewallPolicyTunnelInspectionRuleArgs, opts?: CustomResourceOptions);
    @overload
    def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
                                                  args: NetworkFirewallPolicyTunnelInspectionRuleArgs,
                                                  opts: Optional[ResourceOptions] = None)
    
    @overload
    def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
                                                  opts: Optional[ResourceOptions] = None,
                                                  condition: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
                                                  network_firewall_policy_id: Optional[str] = None,
                                                  protocol: Optional[str] = None,
                                                  action: Optional[str] = None,
                                                  name: Optional[str] = None,
                                                  position: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
                                                  profile: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None)
    func NewNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, args NetworkFirewallPolicyTunnelInspectionRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)
    public NetworkFirewallPolicyTunnelInspectionRule(string name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions? opts = null)
    public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args)
    public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions options)
    
    type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args NetworkFirewallPolicyTunnelInspectionRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args NetworkFirewallPolicyTunnelInspectionRuleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args NetworkFirewallPolicyTunnelInspectionRuleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args NetworkFirewallPolicyTunnelInspectionRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args NetworkFirewallPolicyTunnelInspectionRuleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var networkFirewallPolicyTunnelInspectionRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", new()
    {
        Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
        {
            DestinationAddresses = new[]
            {
                "string",
            },
            SourceAddresses = new[]
            {
                "string",
            },
        },
        NetworkFirewallPolicyId = "string",
        Protocol = "string",
        Action = "string",
        Name = "string",
        Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
        {
            AfterRule = "string",
            BeforeRule = "string",
        },
        Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
        {
            MustReturnTrafficToSource = false,
        },
    });
    
    example, err := NetworkFirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "networkFirewallPolicyTunnelInspectionRuleResource", &NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
    	Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
    		DestinationAddresses: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		SourceAddresses: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    	NetworkFirewallPolicyId: pulumi.String("string"),
    	Protocol:                pulumi.String("string"),
    	Action:                  pulumi.String("string"),
    	Name:                    pulumi.String("string"),
    	Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
    		AfterRule:  pulumi.String("string"),
    		BeforeRule: pulumi.String("string"),
    	},
    	Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
    		MustReturnTrafficToSource: pulumi.Bool(false),
    	},
    })
    
    var networkFirewallPolicyTunnelInspectionRuleResource = new NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
        .condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
            .destinationAddresses("string")
            .sourceAddresses("string")
            .build())
        .networkFirewallPolicyId("string")
        .protocol("string")
        .action("string")
        .name("string")
        .position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
            .afterRule("string")
            .beforeRule("string")
            .build())
        .profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
            .mustReturnTrafficToSource(false)
            .build())
        .build());
    
    network_firewall_policy_tunnel_inspection_rule_resource = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource",
        condition={
            "destination_addresses": ["string"],
            "source_addresses": ["string"],
        },
        network_firewall_policy_id="string",
        protocol="string",
        action="string",
        name="string",
        position={
            "after_rule": "string",
            "before_rule": "string",
        },
        profile={
            "must_return_traffic_to_source": False,
        })
    
    const networkFirewallPolicyTunnelInspectionRuleResource = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", {
        condition: {
            destinationAddresses: ["string"],
            sourceAddresses: ["string"],
        },
        networkFirewallPolicyId: "string",
        protocol: "string",
        action: "string",
        name: "string",
        position: {
            afterRule: "string",
            beforeRule: "string",
        },
        profile: {
            mustReturnTrafficToSource: false,
        },
    });
    
    type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
    properties:
        action: string
        condition:
            destinationAddresses:
                - string
            sourceAddresses:
                - string
        name: string
        networkFirewallPolicyId: string
        position:
            afterRule: string
            beforeRule: string
        profile:
            mustReturnTrafficToSource: false
        protocol: string
    

    NetworkFirewallPolicyTunnelInspectionRule Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The NetworkFirewallPolicyTunnelInspectionRule resource accepts the following input properties:

    Condition NetworkFirewallPolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    Protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    Name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    Position NetworkFirewallPolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    Profile NetworkFirewallPolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    Condition NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    Protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    Name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    Position NetworkFirewallPolicyTunnelInspectionRulePositionArgs
    (Updatable) An object which defines the position of the rule.
    Profile NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    condition PolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    protocol String

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action String
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    name String
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    position PolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    profile PolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    condition NetworkFirewallPolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    networkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    position NetworkFirewallPolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    profile NetworkFirewallPolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    condition networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    network_firewall_policy_id str
    Unique Network Firewall Policy identifier
    protocol str

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action str
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    name str
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    position networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
    (Updatable) An object which defines the position of the rule.
    profile networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    condition Property Map
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    protocol String

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action String
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    name String
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    position Property Map
    (Updatable) An object which defines the position of the rule.
    profile Property Map
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicyTunnelInspectionRule resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    ParentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    PriorityOrder string
    The priority order in which this rule should be evaluated
    Id string
    The provider-assigned unique ID for this managed resource.
    ParentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    PriorityOrder string
    The priority order in which this rule should be evaluated
    id String
    The provider-assigned unique ID for this managed resource.
    parentResourceId String
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    priorityOrder String
    The priority order in which this rule should be evaluated
    id string
    The provider-assigned unique ID for this managed resource.
    parentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    priorityOrder string
    The priority order in which this rule should be evaluated
    id str
    The provider-assigned unique ID for this managed resource.
    parent_resource_id str
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    priority_order str
    The priority order in which this rule should be evaluated
    id String
    The provider-assigned unique ID for this managed resource.
    parentResourceId String
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    priorityOrder String
    The priority order in which this rule should be evaluated

    Look up Existing NetworkFirewallPolicyTunnelInspectionRule Resource

    Get an existing NetworkFirewallPolicyTunnelInspectionRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicyTunnelInspectionRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicyTunnelInspectionRule
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            condition: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
            name: Optional[str] = None,
            network_firewall_policy_id: Optional[str] = None,
            parent_resource_id: Optional[str] = None,
            position: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
            priority_order: Optional[str] = None,
            profile: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None,
            protocol: Optional[str] = None) -> NetworkFirewallPolicyTunnelInspectionRule
    func GetNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicyTunnelInspectionRuleState, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)
    public static NetworkFirewallPolicyTunnelInspectionRule Get(string name, Input<string> id, NetworkFirewallPolicyTunnelInspectionRuleState? state, CustomResourceOptions? opts = null)
    public static NetworkFirewallPolicyTunnelInspectionRule get(String name, Output<String> id, NetworkFirewallPolicyTunnelInspectionRuleState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    Condition NetworkFirewallPolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    Name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    ParentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    Position NetworkFirewallPolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    PriorityOrder string
    The priority order in which this rule should be evaluated
    Profile NetworkFirewallPolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    Protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    Condition NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    Name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    ParentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    Position NetworkFirewallPolicyTunnelInspectionRulePositionArgs
    (Updatable) An object which defines the position of the rule.
    PriorityOrder string
    The priority order in which this rule should be evaluated
    Profile NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    Protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action String
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    condition PolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    name String
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    parentResourceId String
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    position PolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    priorityOrder String
    The priority order in which this rule should be evaluated
    profile PolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    protocol String

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action string
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    condition NetworkFirewallPolicyTunnelInspectionRuleCondition
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    name string
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    networkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    parentResourceId string
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    position NetworkFirewallPolicyTunnelInspectionRulePosition
    (Updatable) An object which defines the position of the rule.
    priorityOrder string
    The priority order in which this rule should be evaluated
    profile NetworkFirewallPolicyTunnelInspectionRuleProfile
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    protocol string

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action str
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    condition networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    name str
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    network_firewall_policy_id str
    Unique Network Firewall Policy identifier
    parent_resource_id str
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    position networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
    (Updatable) An object which defines the position of the rule.
    priority_order str
    The priority order in which this rule should be evaluated
    profile networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    protocol str

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    action String
    (Updatable) Types of Inspect Action on the traffic flow.

    • INSPECT - Inspect the traffic.
    • INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
    condition Property Map
    (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
    name String
    Name for the Tunnel Inspection Rule, must be unique within the policy.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    parentResourceId String
    OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
    position Property Map
    (Updatable) An object which defines the position of the rule.
    priorityOrder String
    The priority order in which this rule should be evaluated
    profile Property Map
    (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
    protocol String

    (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.

    • VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Supporting Types

    NetworkFirewallPolicyTunnelInspectionRuleCondition, NetworkFirewallPolicyTunnelInspectionRuleConditionArgs

    DestinationAddresses List<string>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    SourceAddresses List<string>
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    DestinationAddresses []string
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    SourceAddresses []string
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    destinationAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    sourceAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    destinationAddresses string[]
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    sourceAddresses string[]
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    destination_addresses Sequence[str]
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    source_addresses Sequence[str]
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    destinationAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    sourceAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic source address.

    NetworkFirewallPolicyTunnelInspectionRulePosition, NetworkFirewallPolicyTunnelInspectionRulePositionArgs

    AfterRule string
    (Updatable) Identifier for rule after which this rule lies.
    BeforeRule string
    (Updatable) Identifier for rule before which this rule lies.
    AfterRule string
    (Updatable) Identifier for rule after which this rule lies.
    BeforeRule string
    (Updatable) Identifier for rule before which this rule lies.
    afterRule String
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule String
    (Updatable) Identifier for rule before which this rule lies.
    afterRule string
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule string
    (Updatable) Identifier for rule before which this rule lies.
    after_rule str
    (Updatable) Identifier for rule after which this rule lies.
    before_rule str
    (Updatable) Identifier for rule before which this rule lies.
    afterRule String
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule String
    (Updatable) Identifier for rule before which this rule lies.

    NetworkFirewallPolicyTunnelInspectionRuleProfile, NetworkFirewallPolicyTunnelInspectionRuleProfileArgs

    MustReturnTrafficToSource bool
    (Updatable) Return scanned VXLAN tunnel traffic to source.
    MustReturnTrafficToSource bool
    (Updatable) Return scanned VXLAN tunnel traffic to source.
    mustReturnTrafficToSource Boolean
    (Updatable) Return scanned VXLAN tunnel traffic to source.
    mustReturnTrafficToSource boolean
    (Updatable) Return scanned VXLAN tunnel traffic to source.
    must_return_traffic_to_source bool
    (Updatable) Return scanned VXLAN tunnel traffic to source.
    mustReturnTrafficToSource Boolean
    (Updatable) Return scanned VXLAN tunnel traffic to source.

    Import

    NetworkFirewallPolicyTunnelInspectionRules can be imported using the id, e.g.

    $ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    oci pulumi/pulumi-oci
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the oci Terraform Provider.
    oci logo
    Oracle Cloud Infrastructure v2.17.0 published on Friday, Nov 15, 2024 by Pulumi