oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule
Explore with Pulumi AI
This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Creates a new tunnel inspection rule for the network firewall policy.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkFirewallPolicyTunnelInspectionRule = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", {
condition: {
destinationAddresses: networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
sourceAddresses: networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
},
name: networkFirewallPolicyTunnelInspectionRuleName,
networkFirewallPolicyId: testNetworkFirewallPolicy.id,
protocol: networkFirewallPolicyTunnelInspectionRuleProtocol,
action: networkFirewallPolicyTunnelInspectionRuleAction,
position: {
afterRule: networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
beforeRule: networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
},
profile: {
mustReturnTrafficToSource: networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
},
});
import pulumi
import pulumi_oci as oci
test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
condition={
"destination_addresses": network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
"source_addresses": network_firewall_policy_tunnel_inspection_rule_condition_source_address,
},
name=network_firewall_policy_tunnel_inspection_rule_name,
network_firewall_policy_id=test_network_firewall_policy["id"],
protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
action=network_firewall_policy_tunnel_inspection_rule_action,
position={
"after_rule": network_firewall_policy_tunnel_inspection_rule_position_after_rule,
"before_rule": network_firewall_policy_tunnel_inspection_rule_position_before_rule,
},
profile={
"must_return_traffic_to_source": network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
})
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/NetworkFirewall"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := NetworkFirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "test_network_firewall_policy_tunnel_inspection_rule", &NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
DestinationAddresses: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress),
SourceAddresses: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress),
},
Name: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleName),
NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
Protocol: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProtocol),
Action: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleAction),
Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
AfterRule: pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionAfterRule),
BeforeRule: pulumi.Any(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule),
},
Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
MustReturnTrafficToSource: pulumi.Any(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testNetworkFirewallPolicyTunnelInspectionRule = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule", new()
{
Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
{
DestinationAddresses = networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress,
SourceAddresses = networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress,
},
Name = networkFirewallPolicyTunnelInspectionRuleName,
NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
Protocol = networkFirewallPolicyTunnelInspectionRuleProtocol,
Action = networkFirewallPolicyTunnelInspectionRuleAction,
Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
{
AfterRule = networkFirewallPolicyTunnelInspectionRulePositionAfterRule,
BeforeRule = networkFirewallPolicyTunnelInspectionRulePositionBeforeRule,
},
Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
{
MustReturnTrafficToSource = networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource,
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testNetworkFirewallPolicyTunnelInspectionRule = new NetworkFirewallPolicyTunnelInspectionRule("testNetworkFirewallPolicyTunnelInspectionRule", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
.condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
.destinationAddresses(networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress)
.sourceAddresses(networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress)
.build())
.name(networkFirewallPolicyTunnelInspectionRuleName)
.networkFirewallPolicyId(testNetworkFirewallPolicy.id())
.protocol(networkFirewallPolicyTunnelInspectionRuleProtocol)
.action(networkFirewallPolicyTunnelInspectionRuleAction)
.position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
.afterRule(networkFirewallPolicyTunnelInspectionRulePositionAfterRule)
.beforeRule(networkFirewallPolicyTunnelInspectionRulePositionBeforeRule)
.build())
.profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
.mustReturnTrafficToSource(networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource)
.build())
.build());
}
}
resources:
testNetworkFirewallPolicyTunnelInspectionRule:
type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
name: test_network_firewall_policy_tunnel_inspection_rule
properties:
condition:
destinationAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionDestinationAddress}
sourceAddresses: ${networkFirewallPolicyTunnelInspectionRuleConditionSourceAddress}
name: ${networkFirewallPolicyTunnelInspectionRuleName}
networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
protocol: ${networkFirewallPolicyTunnelInspectionRuleProtocol}
action: ${networkFirewallPolicyTunnelInspectionRuleAction}
position:
afterRule: ${networkFirewallPolicyTunnelInspectionRulePositionAfterRule}
beforeRule: ${networkFirewallPolicyTunnelInspectionRulePositionBeforeRule}
profile:
mustReturnTrafficToSource: ${networkFirewallPolicyTunnelInspectionRuleProfileMustReturnTrafficToSource}
Create NetworkFirewallPolicyTunnelInspectionRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NetworkFirewallPolicyTunnelInspectionRule(name: string, args: NetworkFirewallPolicyTunnelInspectionRuleArgs, opts?: CustomResourceOptions);
@overload
def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
args: NetworkFirewallPolicyTunnelInspectionRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def NetworkFirewallPolicyTunnelInspectionRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
condition: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
network_firewall_policy_id: Optional[str] = None,
protocol: Optional[str] = None,
action: Optional[str] = None,
name: Optional[str] = None,
position: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
profile: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None)
func NewNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, args NetworkFirewallPolicyTunnelInspectionRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)
public NetworkFirewallPolicyTunnelInspectionRule(string name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions? opts = null)
public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args)
public NetworkFirewallPolicyTunnelInspectionRule(String name, NetworkFirewallPolicyTunnelInspectionRuleArgs args, CustomResourceOptions options)
type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NetworkFirewallPolicyTunnelInspectionRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var networkFirewallPolicyTunnelInspectionRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", new()
{
Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
{
DestinationAddresses = new[]
{
"string",
},
SourceAddresses = new[]
{
"string",
},
},
NetworkFirewallPolicyId = "string",
Protocol = "string",
Action = "string",
Name = "string",
Position = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRulePositionArgs
{
AfterRule = "string",
BeforeRule = "string",
},
Profile = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
{
MustReturnTrafficToSource = false,
},
});
example, err := NetworkFirewall.NewNetworkFirewallPolicyTunnelInspectionRule(ctx, "networkFirewallPolicyTunnelInspectionRuleResource", &NetworkFirewall.NetworkFirewallPolicyTunnelInspectionRuleArgs{
Condition: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs{
DestinationAddresses: pulumi.StringArray{
pulumi.String("string"),
},
SourceAddresses: pulumi.StringArray{
pulumi.String("string"),
},
},
NetworkFirewallPolicyId: pulumi.String("string"),
Protocol: pulumi.String("string"),
Action: pulumi.String("string"),
Name: pulumi.String("string"),
Position: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs{
AfterRule: pulumi.String("string"),
BeforeRule: pulumi.String("string"),
},
Profile: &networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs{
MustReturnTrafficToSource: pulumi.Bool(false),
},
})
var networkFirewallPolicyTunnelInspectionRuleResource = new NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", NetworkFirewallPolicyTunnelInspectionRuleArgs.builder()
.condition(NetworkFirewallPolicyTunnelInspectionRuleConditionArgs.builder()
.destinationAddresses("string")
.sourceAddresses("string")
.build())
.networkFirewallPolicyId("string")
.protocol("string")
.action("string")
.name("string")
.position(NetworkFirewallPolicyTunnelInspectionRulePositionArgs.builder()
.afterRule("string")
.beforeRule("string")
.build())
.profile(NetworkFirewallPolicyTunnelInspectionRuleProfileArgs.builder()
.mustReturnTrafficToSource(false)
.build())
.build());
network_firewall_policy_tunnel_inspection_rule_resource = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource",
condition={
"destination_addresses": ["string"],
"source_addresses": ["string"],
},
network_firewall_policy_id="string",
protocol="string",
action="string",
name="string",
position={
"after_rule": "string",
"before_rule": "string",
},
profile={
"must_return_traffic_to_source": False,
})
const networkFirewallPolicyTunnelInspectionRuleResource = new oci.networkfirewall.NetworkFirewallPolicyTunnelInspectionRule("networkFirewallPolicyTunnelInspectionRuleResource", {
condition: {
destinationAddresses: ["string"],
sourceAddresses: ["string"],
},
networkFirewallPolicyId: "string",
protocol: "string",
action: "string",
name: "string",
position: {
afterRule: "string",
beforeRule: "string",
},
profile: {
mustReturnTrafficToSource: false,
},
});
type: oci:NetworkFirewall:NetworkFirewallPolicyTunnelInspectionRule
properties:
action: string
condition:
destinationAddresses:
- string
sourceAddresses:
- string
name: string
networkFirewallPolicyId: string
position:
afterRule: string
beforeRule: string
profile:
mustReturnTrafficToSource: false
protocol: string
NetworkFirewallPolicyTunnelInspectionRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The NetworkFirewallPolicyTunnelInspectionRule resource accepts the following input properties:
- Condition
Network
Firewall Policy Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Position
Network
Firewall Policy Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- Profile
Network
Firewall Policy Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Condition
Network
Firewall Policy Tunnel Inspection Rule Condition Args - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Position
Network
Firewall Policy Tunnel Inspection Rule Position Args - (Updatable) An object which defines the position of the rule.
- Profile
Network
Firewall Policy Tunnel Inspection Rule Profile Args - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
Policy
Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- protocol String
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action String
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
Policy
Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- profile
Policy
Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
Network
Firewall Policy Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
Network
Firewall Policy Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- profile
Network
Firewall Policy Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Condition Args - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- network_
firewall_ strpolicy_ id - Unique Network Firewall Policy identifier
- protocol str
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action str
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- name str
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Position Args - (Updatable) An object which defines the position of the rule.
- profile
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Profile Args - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- condition Property Map
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- protocol String
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action String
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- position Property Map
- (Updatable) An object which defines the position of the rule.
- profile Property Map
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
Outputs
All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicyTunnelInspectionRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Priority
Order string - The priority order in which this rule should be evaluated
- Id string
- The provider-assigned unique ID for this managed resource.
- Parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Priority
Order string - The priority order in which this rule should be evaluated
- id String
- The provider-assigned unique ID for this managed resource.
- parent
Resource StringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priority
Order String - The priority order in which this rule should be evaluated
- id string
- The provider-assigned unique ID for this managed resource.
- parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priority
Order string - The priority order in which this rule should be evaluated
- id str
- The provider-assigned unique ID for this managed resource.
- parent_
resource_ strid - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priority_
order str - The priority order in which this rule should be evaluated
- id String
- The provider-assigned unique ID for this managed resource.
- parent
Resource StringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- priority
Order String - The priority order in which this rule should be evaluated
Look up Existing NetworkFirewallPolicyTunnelInspectionRule Resource
Get an existing NetworkFirewallPolicyTunnelInspectionRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicyTunnelInspectionRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicyTunnelInspectionRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
condition: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs] = None,
name: Optional[str] = None,
network_firewall_policy_id: Optional[str] = None,
parent_resource_id: Optional[str] = None,
position: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs] = None,
priority_order: Optional[str] = None,
profile: Optional[_networkfirewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs] = None,
protocol: Optional[str] = None) -> NetworkFirewallPolicyTunnelInspectionRule
func GetNetworkFirewallPolicyTunnelInspectionRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicyTunnelInspectionRuleState, opts ...ResourceOption) (*NetworkFirewallPolicyTunnelInspectionRule, error)
public static NetworkFirewallPolicyTunnelInspectionRule Get(string name, Input<string> id, NetworkFirewallPolicyTunnelInspectionRuleState? state, CustomResourceOptions? opts = null)
public static NetworkFirewallPolicyTunnelInspectionRule get(String name, Output<String> id, NetworkFirewallPolicyTunnelInspectionRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- Condition
Network
Firewall Policy Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Position
Network
Firewall Policy Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- Priority
Order string - The priority order in which this rule should be evaluated
- Profile
Network
Firewall Policy Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- Condition
Network
Firewall Policy Tunnel Inspection Rule Condition Args - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- Position
Network
Firewall Policy Tunnel Inspection Rule Position Args - (Updatable) An object which defines the position of the rule.
- Priority
Order string - The priority order in which this rule should be evaluated
- Profile
Network
Firewall Policy Tunnel Inspection Rule Profile Args - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- Protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action String
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- condition
Policy
Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource StringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
Policy
Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- priority
Order String - The priority order in which this rule should be evaluated
- profile
Policy
Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol String
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action string
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- condition
Network
Firewall Policy Tunnel Inspection Rule Condition - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name string
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource stringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
Network
Firewall Policy Tunnel Inspection Rule Position - (Updatable) An object which defines the position of the rule.
- priority
Order string - The priority order in which this rule should be evaluated
- profile
Network
Firewall Policy Tunnel Inspection Rule Profile - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol string
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action str
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- condition
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Condition Args - (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name str
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- network_
firewall_ strpolicy_ id - Unique Network Firewall Policy identifier
- parent_
resource_ strid - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Position Args - (Updatable) An object which defines the position of the rule.
- priority_
order str - The priority order in which this rule should be evaluated
- profile
networkfirewall.
Network Firewall Policy Tunnel Inspection Rule Profile Args - (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol str
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- action String
- (Updatable) Types of Inspect Action on the traffic flow.
- INSPECT - Inspect the traffic.
- INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
- condition Property Map
- (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- name String
- Name for the Tunnel Inspection Rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource StringId - OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
- position Property Map
- (Updatable) An object which defines the position of the rule.
- priority
Order String - The priority order in which this rule should be evaluated
- profile Property Map
- (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
- protocol String
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
- VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
Supporting Types
NetworkFirewallPolicyTunnelInspectionRuleCondition, NetworkFirewallPolicyTunnelInspectionRuleConditionArgs
- Destination
Addresses List<string> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Source
Addresses List<string> - (Updatable) An array of address list names to be evaluated against the traffic source address.
- Destination
Addresses []string - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Source
Addresses []string - (Updatable) An array of address list names to be evaluated against the traffic source address.
- destination
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- source
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic source address.
- destination
Addresses string[] - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- source
Addresses string[] - (Updatable) An array of address list names to be evaluated against the traffic source address.
- destination_
addresses Sequence[str] - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- source_
addresses Sequence[str] - (Updatable) An array of address list names to be evaluated against the traffic source address.
- destination
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- source
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic source address.
NetworkFirewallPolicyTunnelInspectionRulePosition, NetworkFirewallPolicyTunnelInspectionRulePositionArgs
- After
Rule string - (Updatable) Identifier for rule after which this rule lies.
- Before
Rule string - (Updatable) Identifier for rule before which this rule lies.
- After
Rule string - (Updatable) Identifier for rule after which this rule lies.
- Before
Rule string - (Updatable) Identifier for rule before which this rule lies.
- after
Rule String - (Updatable) Identifier for rule after which this rule lies.
- before
Rule String - (Updatable) Identifier for rule before which this rule lies.
- after
Rule string - (Updatable) Identifier for rule after which this rule lies.
- before
Rule string - (Updatable) Identifier for rule before which this rule lies.
- after_
rule str - (Updatable) Identifier for rule after which this rule lies.
- before_
rule str - (Updatable) Identifier for rule before which this rule lies.
- after
Rule String - (Updatable) Identifier for rule after which this rule lies.
- before
Rule String - (Updatable) Identifier for rule before which this rule lies.
NetworkFirewallPolicyTunnelInspectionRuleProfile, NetworkFirewallPolicyTunnelInspectionRuleProfileArgs
- Must
Return boolTraffic To Source - (Updatable) Return scanned VXLAN tunnel traffic to source.
- Must
Return boolTraffic To Source - (Updatable) Return scanned VXLAN tunnel traffic to source.
- must
Return BooleanTraffic To Source - (Updatable) Return scanned VXLAN tunnel traffic to source.
- must
Return booleanTraffic To Source - (Updatable) Return scanned VXLAN tunnel traffic to source.
- must_
return_ booltraffic_ to_ source - (Updatable) Return scanned VXLAN tunnel traffic to source.
- must
Return BooleanTraffic To Source - (Updatable) Return scanned VXLAN tunnel traffic to source.
Import
NetworkFirewallPolicyTunnelInspectionRules can be imported using the id
, e.g.
$ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.