1. Packages
  2. Zscaler Internet Access (ZIA)
  3. API Docs
  4. FirewallFilteringRule
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

zia.FirewallFilteringRule

Explore with Pulumi AI

zia logo
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

    The zia_firewall_filtering_rule resource allows the creation and management of ZIA Cloud Firewall filtering rules in the Zscaler Internet Access.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const zscalerProxyNwServices = zia.getFirewallFilteringNetworkServices({
        name: "ZSCALER_PROXY_NW_SERVICES",
    });
    const engineering = zia.getDepartmentManagement({
        name: "Engineering",
    });
    const normalInternet = zia.getGroupManagement({
        name: "Normal_Internet",
    });
    const workHours = zia.getTimeWindow({
        name: "Work hours",
    });
    const example = new zia.FirewallFilteringRule("example", {
        description: "Example",
        action: "ALLOW",
        state: "ENABLED",
        order: 1,
        enableFullLogging: true,
        nwServices: {
            ids: [zscalerProxyNwServices.then(zscalerProxyNwServices => zscalerProxyNwServices.id)],
        },
        departments: {
            ids: [engineering.then(engineering => engineering.id)],
        },
        groups: {
            ids: [normalInternet.then(normalInternet => normalInternet.id)],
        },
        timeWindows: {
            ids: [workHours.then(workHours => workHours.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    zscaler_proxy_nw_services = zia.get_firewall_filtering_network_services(name="ZSCALER_PROXY_NW_SERVICES")
    engineering = zia.get_department_management(name="Engineering")
    normal_internet = zia.get_group_management(name="Normal_Internet")
    work_hours = zia.get_time_window(name="Work hours")
    example = zia.FirewallFilteringRule("example",
        description="Example",
        action="ALLOW",
        state="ENABLED",
        order=1,
        enable_full_logging=True,
        nw_services=zia.FirewallFilteringRuleNwServicesArgs(
            ids=[zscaler_proxy_nw_services.id],
        ),
        departments=zia.FirewallFilteringRuleDepartmentsArgs(
            ids=[engineering.id],
        ),
        groups=zia.FirewallFilteringRuleGroupsArgs(
            ids=[normal_internet.id],
        ),
        time_windows=zia.FirewallFilteringRuleTimeWindowsArgs(
            ids=[work_hours.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		zscalerProxyNwServices, err := zia.LookupFirewallFilteringNetworkServices(ctx, &zia.LookupFirewallFilteringNetworkServicesArgs{
    			Name: pulumi.StringRef("ZSCALER_PROXY_NW_SERVICES"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
    			Name: pulumi.StringRef("Engineering"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		normalInternet, err := zia.GetGroupManagement(ctx, &zia.GetGroupManagementArgs{
    			Name: pulumi.StringRef("Normal_Internet"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		workHours, err := zia.GetTimeWindow(ctx, &zia.GetTimeWindowArgs{
    			Name: pulumi.StringRef("Work hours"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = zia.NewFirewallFilteringRule(ctx, "example", &zia.FirewallFilteringRuleArgs{
    			Description:       pulumi.String("Example"),
    			Action:            pulumi.String("ALLOW"),
    			State:             pulumi.String("ENABLED"),
    			Order:             pulumi.Int(1),
    			EnableFullLogging: pulumi.Bool(true),
    			NwServices: &zia.FirewallFilteringRuleNwServicesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(zscalerProxyNwServices.Id),
    				},
    			},
    			Departments: &zia.FirewallFilteringRuleDepartmentsArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(engineering.Id),
    				},
    			},
    			Groups: &zia.FirewallFilteringRuleGroupsArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(normalInternet.Id),
    				},
    			},
    			TimeWindows: &zia.FirewallFilteringRuleTimeWindowsArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(workHours.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var zscalerProxyNwServices = Zia.GetFirewallFilteringNetworkServices.Invoke(new()
        {
            Name = "ZSCALER_PROXY_NW_SERVICES",
        });
    
        var engineering = Zia.GetDepartmentManagement.Invoke(new()
        {
            Name = "Engineering",
        });
    
        var normalInternet = Zia.GetGroupManagement.Invoke(new()
        {
            Name = "Normal_Internet",
        });
    
        var workHours = Zia.GetTimeWindow.Invoke(new()
        {
            Name = "Work hours",
        });
    
        var example = new Zia.FirewallFilteringRule("example", new()
        {
            Description = "Example",
            Action = "ALLOW",
            State = "ENABLED",
            Order = 1,
            EnableFullLogging = true,
            NwServices = new Zia.Inputs.FirewallFilteringRuleNwServicesArgs
            {
                Ids = new[]
                {
                    zscalerProxyNwServices.Apply(getFirewallFilteringNetworkServicesResult => getFirewallFilteringNetworkServicesResult.Id),
                },
            },
            Departments = new Zia.Inputs.FirewallFilteringRuleDepartmentsArgs
            {
                Ids = new[]
                {
                    engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
                },
            },
            Groups = new Zia.Inputs.FirewallFilteringRuleGroupsArgs
            {
                Ids = new[]
                {
                    normalInternet.Apply(getGroupManagementResult => getGroupManagementResult.Id),
                },
            },
            TimeWindows = new Zia.Inputs.FirewallFilteringRuleTimeWindowsArgs
            {
                Ids = new[]
                {
                    workHours.Apply(getTimeWindowResult => getTimeWindowResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetFirewallFilteringNetworkServicesArgs;
    import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
    import com.pulumi.zia.inputs.GetGroupManagementArgs;
    import com.pulumi.zia.inputs.GetTimeWindowArgs;
    import com.pulumi.zia.FirewallFilteringRule;
    import com.pulumi.zia.FirewallFilteringRuleArgs;
    import com.pulumi.zia.inputs.FirewallFilteringRuleNwServicesArgs;
    import com.pulumi.zia.inputs.FirewallFilteringRuleDepartmentsArgs;
    import com.pulumi.zia.inputs.FirewallFilteringRuleGroupsArgs;
    import com.pulumi.zia.inputs.FirewallFilteringRuleTimeWindowsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var zscalerProxyNwServices = ZiaFunctions.getFirewallFilteringNetworkServices(GetFirewallFilteringNetworkServicesArgs.builder()
                .name("ZSCALER_PROXY_NW_SERVICES")
                .build());
    
            final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
                .name("Engineering")
                .build());
    
            final var normalInternet = ZiaFunctions.getGroupManagement(GetGroupManagementArgs.builder()
                .name("Normal_Internet")
                .build());
    
            final var workHours = ZiaFunctions.getTimeWindow(GetTimeWindowArgs.builder()
                .name("Work hours")
                .build());
    
            var example = new FirewallFilteringRule("example", FirewallFilteringRuleArgs.builder()
                .description("Example")
                .action("ALLOW")
                .state("ENABLED")
                .order(1)
                .enableFullLogging(true)
                .nwServices(FirewallFilteringRuleNwServicesArgs.builder()
                    .ids(zscalerProxyNwServices.applyValue(getFirewallFilteringNetworkServicesResult -> getFirewallFilteringNetworkServicesResult.id()))
                    .build())
                .departments(FirewallFilteringRuleDepartmentsArgs.builder()
                    .ids(engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()))
                    .build())
                .groups(FirewallFilteringRuleGroupsArgs.builder()
                    .ids(normalInternet.applyValue(getGroupManagementResult -> getGroupManagementResult.id()))
                    .build())
                .timeWindows(FirewallFilteringRuleTimeWindowsArgs.builder()
                    .ids(workHours.applyValue(getTimeWindowResult -> getTimeWindowResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: zia:FirewallFilteringRule
        properties:
          description: Example
          action: ALLOW
          state: ENABLED
          order: 1
          enableFullLogging: true
          nwServices:
            ids:
              - ${zscalerProxyNwServices.id}
          departments:
            ids:
              - ${engineering.id}
          groups:
            ids:
              - ${normalInternet.id}
          timeWindows:
            ids:
              - ${workHours.id}
    variables:
      zscalerProxyNwServices:
        fn::invoke:
          Function: zia:getFirewallFilteringNetworkServices
          Arguments:
            name: ZSCALER_PROXY_NW_SERVICES
      engineering:
        fn::invoke:
          Function: zia:getDepartmentManagement
          Arguments:
            name: Engineering
      normalInternet:
        fn::invoke:
          Function: zia:getGroupManagement
          Arguments:
            name: Normal_Internet
      workHours:
        fn::invoke:
          Function: zia:getTimeWindow
          Arguments:
            name: Work hours
    

    Create FirewallFilteringRule Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new FirewallFilteringRule(name: string, args?: FirewallFilteringRuleArgs, opts?: CustomResourceOptions);
    @overload
    def FirewallFilteringRule(resource_name: str,
                              args: Optional[FirewallFilteringRuleArgs] = None,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def FirewallFilteringRule(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              action: Optional[str] = None,
                              app_service_groups: Optional[FirewallFilteringRuleAppServiceGroupsArgs] = None,
                              app_services: Optional[FirewallFilteringRuleAppServicesArgs] = None,
                              default_rule: Optional[bool] = None,
                              departments: Optional[FirewallFilteringRuleDepartmentsArgs] = None,
                              description: Optional[str] = None,
                              dest_addresses: Optional[Sequence[str]] = None,
                              dest_countries: Optional[Sequence[str]] = None,
                              dest_ip_categories: Optional[Sequence[str]] = None,
                              dest_ip_groups: Optional[FirewallFilteringRuleDestIpGroupsArgs] = None,
                              device_groups: Optional[FirewallFilteringRuleDeviceGroupsArgs] = None,
                              device_trust_levels: Optional[Sequence[str]] = None,
                              devices: Optional[FirewallFilteringRuleDevicesArgs] = None,
                              enable_full_logging: Optional[bool] = None,
                              groups: Optional[FirewallFilteringRuleGroupsArgs] = None,
                              labels: Optional[FirewallFilteringRuleLabelsArgs] = None,
                              location_groups: Optional[FirewallFilteringRuleLocationGroupsArgs] = None,
                              locations: Optional[FirewallFilteringRuleLocationsArgs] = None,
                              name: Optional[str] = None,
                              nw_application_groups: Optional[FirewallFilteringRuleNwApplicationGroupsArgs] = None,
                              nw_applications: Optional[Sequence[str]] = None,
                              nw_service_groups: Optional[FirewallFilteringRuleNwServiceGroupsArgs] = None,
                              nw_services: Optional[FirewallFilteringRuleNwServicesArgs] = None,
                              order: Optional[int] = None,
                              predefined: Optional[bool] = None,
                              rank: Optional[int] = None,
                              src_ip_groups: Optional[FirewallFilteringRuleSrcIpGroupsArgs] = None,
                              src_ips: Optional[Sequence[str]] = None,
                              state: Optional[str] = None,
                              time_windows: Optional[FirewallFilteringRuleTimeWindowsArgs] = None,
                              users: Optional[FirewallFilteringRuleUsersArgs] = None,
                              workload_groups: Optional[Sequence[FirewallFilteringRuleWorkloadGroupArgs]] = None,
                              zpa_app_segments: Optional[Sequence[FirewallFilteringRuleZpaAppSegmentArgs]] = None)
    func NewFirewallFilteringRule(ctx *Context, name string, args *FirewallFilteringRuleArgs, opts ...ResourceOption) (*FirewallFilteringRule, error)
    public FirewallFilteringRule(string name, FirewallFilteringRuleArgs? args = null, CustomResourceOptions? opts = null)
    public FirewallFilteringRule(String name, FirewallFilteringRuleArgs args)
    public FirewallFilteringRule(String name, FirewallFilteringRuleArgs args, CustomResourceOptions options)
    
    type: zia:FirewallFilteringRule
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args FirewallFilteringRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args FirewallFilteringRuleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args FirewallFilteringRuleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args FirewallFilteringRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args FirewallFilteringRuleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var firewallFilteringRuleResource = new Zia.FirewallFilteringRule("firewallFilteringRuleResource", new()
    {
        Action = "string",
        AppServiceGroups = new Zia.Inputs.FirewallFilteringRuleAppServiceGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        AppServices = new Zia.Inputs.FirewallFilteringRuleAppServicesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        DefaultRule = false,
        Departments = new Zia.Inputs.FirewallFilteringRuleDepartmentsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Description = "string",
        DestAddresses = new[]
        {
            "string",
        },
        DestCountries = new[]
        {
            "string",
        },
        DestIpCategories = new[]
        {
            "string",
        },
        DestIpGroups = new Zia.Inputs.FirewallFilteringRuleDestIpGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        DeviceGroups = new Zia.Inputs.FirewallFilteringRuleDeviceGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        DeviceTrustLevels = new[]
        {
            "string",
        },
        Devices = new Zia.Inputs.FirewallFilteringRuleDevicesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        EnableFullLogging = false,
        Groups = new Zia.Inputs.FirewallFilteringRuleGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Labels = new Zia.Inputs.FirewallFilteringRuleLabelsArgs
        {
            Id = 0,
        },
        LocationGroups = new Zia.Inputs.FirewallFilteringRuleLocationGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Locations = new Zia.Inputs.FirewallFilteringRuleLocationsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Name = "string",
        NwApplicationGroups = new Zia.Inputs.FirewallFilteringRuleNwApplicationGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        NwApplications = new[]
        {
            "string",
        },
        NwServiceGroups = new Zia.Inputs.FirewallFilteringRuleNwServiceGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        NwServices = new Zia.Inputs.FirewallFilteringRuleNwServicesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Order = 0,
        Predefined = false,
        Rank = 0,
        SrcIpGroups = new Zia.Inputs.FirewallFilteringRuleSrcIpGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        SrcIps = new[]
        {
            "string",
        },
        State = "string",
        TimeWindows = new Zia.Inputs.FirewallFilteringRuleTimeWindowsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Users = new Zia.Inputs.FirewallFilteringRuleUsersArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        WorkloadGroups = new[]
        {
            new Zia.Inputs.FirewallFilteringRuleWorkloadGroupArgs
            {
                Id = 0,
                Name = "string",
            },
        },
        ZpaAppSegments = new[]
        {
            new Zia.Inputs.FirewallFilteringRuleZpaAppSegmentArgs
            {
                ExternalId = "string",
                Name = "string",
            },
        },
    });
    
    example, err := zia.NewFirewallFilteringRule(ctx, "firewallFilteringRuleResource", &zia.FirewallFilteringRuleArgs{
    	Action: pulumi.String("string"),
    	AppServiceGroups: &zia.FirewallFilteringRuleAppServiceGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	AppServices: &zia.FirewallFilteringRuleAppServicesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	DefaultRule: pulumi.Bool(false),
    	Departments: &zia.FirewallFilteringRuleDepartmentsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Description: pulumi.String("string"),
    	DestAddresses: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	DestCountries: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	DestIpCategories: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	DestIpGroups: &zia.FirewallFilteringRuleDestIpGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	DeviceGroups: &zia.FirewallFilteringRuleDeviceGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	DeviceTrustLevels: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Devices: &zia.FirewallFilteringRuleDevicesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	EnableFullLogging: pulumi.Bool(false),
    	Groups: &zia.FirewallFilteringRuleGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Labels: &zia.FirewallFilteringRuleLabelsArgs{
    		Id: pulumi.Int(0),
    	},
    	LocationGroups: &zia.FirewallFilteringRuleLocationGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Locations: &zia.FirewallFilteringRuleLocationsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Name: pulumi.String("string"),
    	NwApplicationGroups: &zia.FirewallFilteringRuleNwApplicationGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	NwApplications: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	NwServiceGroups: &zia.FirewallFilteringRuleNwServiceGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	NwServices: &zia.FirewallFilteringRuleNwServicesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Order:      pulumi.Int(0),
    	Predefined: pulumi.Bool(false),
    	Rank:       pulumi.Int(0),
    	SrcIpGroups: &zia.FirewallFilteringRuleSrcIpGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	SrcIps: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	State: pulumi.String("string"),
    	TimeWindows: &zia.FirewallFilteringRuleTimeWindowsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Users: &zia.FirewallFilteringRuleUsersArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	WorkloadGroups: zia.FirewallFilteringRuleWorkloadGroupArray{
    		&zia.FirewallFilteringRuleWorkloadGroupArgs{
    			Id:   pulumi.Int(0),
    			Name: pulumi.String("string"),
    		},
    	},
    	ZpaAppSegments: zia.FirewallFilteringRuleZpaAppSegmentArray{
    		&zia.FirewallFilteringRuleZpaAppSegmentArgs{
    			ExternalId: pulumi.String("string"),
    			Name:       pulumi.String("string"),
    		},
    	},
    })
    
    var firewallFilteringRuleResource = new FirewallFilteringRule("firewallFilteringRuleResource", FirewallFilteringRuleArgs.builder()
        .action("string")
        .appServiceGroups(FirewallFilteringRuleAppServiceGroupsArgs.builder()
            .ids(0)
            .build())
        .appServices(FirewallFilteringRuleAppServicesArgs.builder()
            .ids(0)
            .build())
        .defaultRule(false)
        .departments(FirewallFilteringRuleDepartmentsArgs.builder()
            .ids(0)
            .build())
        .description("string")
        .destAddresses("string")
        .destCountries("string")
        .destIpCategories("string")
        .destIpGroups(FirewallFilteringRuleDestIpGroupsArgs.builder()
            .ids(0)
            .build())
        .deviceGroups(FirewallFilteringRuleDeviceGroupsArgs.builder()
            .ids(0)
            .build())
        .deviceTrustLevels("string")
        .devices(FirewallFilteringRuleDevicesArgs.builder()
            .ids(0)
            .build())
        .enableFullLogging(false)
        .groups(FirewallFilteringRuleGroupsArgs.builder()
            .ids(0)
            .build())
        .labels(FirewallFilteringRuleLabelsArgs.builder()
            .id(0)
            .build())
        .locationGroups(FirewallFilteringRuleLocationGroupsArgs.builder()
            .ids(0)
            .build())
        .locations(FirewallFilteringRuleLocationsArgs.builder()
            .ids(0)
            .build())
        .name("string")
        .nwApplicationGroups(FirewallFilteringRuleNwApplicationGroupsArgs.builder()
            .ids(0)
            .build())
        .nwApplications("string")
        .nwServiceGroups(FirewallFilteringRuleNwServiceGroupsArgs.builder()
            .ids(0)
            .build())
        .nwServices(FirewallFilteringRuleNwServicesArgs.builder()
            .ids(0)
            .build())
        .order(0)
        .predefined(false)
        .rank(0)
        .srcIpGroups(FirewallFilteringRuleSrcIpGroupsArgs.builder()
            .ids(0)
            .build())
        .srcIps("string")
        .state("string")
        .timeWindows(FirewallFilteringRuleTimeWindowsArgs.builder()
            .ids(0)
            .build())
        .users(FirewallFilteringRuleUsersArgs.builder()
            .ids(0)
            .build())
        .workloadGroups(FirewallFilteringRuleWorkloadGroupArgs.builder()
            .id(0)
            .name("string")
            .build())
        .zpaAppSegments(FirewallFilteringRuleZpaAppSegmentArgs.builder()
            .externalId("string")
            .name("string")
            .build())
        .build());
    
    firewall_filtering_rule_resource = zia.FirewallFilteringRule("firewallFilteringRuleResource",
        action="string",
        app_service_groups={
            "ids": [0],
        },
        app_services={
            "ids": [0],
        },
        default_rule=False,
        departments={
            "ids": [0],
        },
        description="string",
        dest_addresses=["string"],
        dest_countries=["string"],
        dest_ip_categories=["string"],
        dest_ip_groups={
            "ids": [0],
        },
        device_groups={
            "ids": [0],
        },
        device_trust_levels=["string"],
        devices={
            "ids": [0],
        },
        enable_full_logging=False,
        groups={
            "ids": [0],
        },
        labels={
            "id": 0,
        },
        location_groups={
            "ids": [0],
        },
        locations={
            "ids": [0],
        },
        name="string",
        nw_application_groups={
            "ids": [0],
        },
        nw_applications=["string"],
        nw_service_groups={
            "ids": [0],
        },
        nw_services={
            "ids": [0],
        },
        order=0,
        predefined=False,
        rank=0,
        src_ip_groups={
            "ids": [0],
        },
        src_ips=["string"],
        state="string",
        time_windows={
            "ids": [0],
        },
        users={
            "ids": [0],
        },
        workload_groups=[{
            "id": 0,
            "name": "string",
        }],
        zpa_app_segments=[{
            "external_id": "string",
            "name": "string",
        }])
    
    const firewallFilteringRuleResource = new zia.FirewallFilteringRule("firewallFilteringRuleResource", {
        action: "string",
        appServiceGroups: {
            ids: [0],
        },
        appServices: {
            ids: [0],
        },
        defaultRule: false,
        departments: {
            ids: [0],
        },
        description: "string",
        destAddresses: ["string"],
        destCountries: ["string"],
        destIpCategories: ["string"],
        destIpGroups: {
            ids: [0],
        },
        deviceGroups: {
            ids: [0],
        },
        deviceTrustLevels: ["string"],
        devices: {
            ids: [0],
        },
        enableFullLogging: false,
        groups: {
            ids: [0],
        },
        labels: {
            id: 0,
        },
        locationGroups: {
            ids: [0],
        },
        locations: {
            ids: [0],
        },
        name: "string",
        nwApplicationGroups: {
            ids: [0],
        },
        nwApplications: ["string"],
        nwServiceGroups: {
            ids: [0],
        },
        nwServices: {
            ids: [0],
        },
        order: 0,
        predefined: false,
        rank: 0,
        srcIpGroups: {
            ids: [0],
        },
        srcIps: ["string"],
        state: "string",
        timeWindows: {
            ids: [0],
        },
        users: {
            ids: [0],
        },
        workloadGroups: [{
            id: 0,
            name: "string",
        }],
        zpaAppSegments: [{
            externalId: "string",
            name: "string",
        }],
    });
    
    type: zia:FirewallFilteringRule
    properties:
        action: string
        appServiceGroups:
            ids:
                - 0
        appServices:
            ids:
                - 0
        defaultRule: false
        departments:
            ids:
                - 0
        description: string
        destAddresses:
            - string
        destCountries:
            - string
        destIpCategories:
            - string
        destIpGroups:
            ids:
                - 0
        deviceGroups:
            ids:
                - 0
        deviceTrustLevels:
            - string
        devices:
            ids:
                - 0
        enableFullLogging: false
        groups:
            ids:
                - 0
        labels:
            id: 0
        locationGroups:
            ids:
                - 0
        locations:
            ids:
                - 0
        name: string
        nwApplicationGroups:
            ids:
                - 0
        nwApplications:
            - string
        nwServiceGroups:
            ids:
                - 0
        nwServices:
            ids:
                - 0
        order: 0
        predefined: false
        rank: 0
        srcIpGroups:
            ids:
                - 0
        srcIps:
            - string
        state: string
        timeWindows:
            ids:
                - 0
        users:
            ids:
                - 0
        workloadGroups:
            - id: 0
              name: string
        zpaAppSegments:
            - externalId: string
              name: string
    

    FirewallFilteringRule Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The FirewallFilteringRule resource accepts the following input properties:

    Action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    AppServiceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleAppServiceGroups
    list of application service groups
    AppServices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleAppServices
    list of application services
    DefaultRule bool
    If set to true, the default rule is applied
    Departments zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    Description string
    Additional information about the rule
    DestAddresses List<string>
    DestCountries List<string>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    DestIpCategories List<string>
    DestIpGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    DeviceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    DeviceTrustLevels List<string>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    Devices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    EnableFullLogging bool
    Groups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    Labels zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    LocationGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLocationGroups
    list of locations groups
    Locations zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    Name string
    Name of the Firewall Filtering policy rule
    NwApplicationGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    NwApplications List<string>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    NwServiceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    NwServices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwServices
    list of nw services
    Order int
    Rule order number of the Firewall Filtering policy rule
    Predefined bool
    If set to true, a predefined rule is applied
    Rank int
    Admin rank of the Firewall Filtering policy rule
    SrcIpGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    SrcIps List<string>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    State string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    TimeWindows zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    Users zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleUsers
    list of users for which rule must be applied
    WorkloadGroups List<zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    ZpaAppSegments List<zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleZpaAppSegment>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    Action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    AppServiceGroups FirewallFilteringRuleAppServiceGroupsArgs
    list of application service groups
    AppServices FirewallFilteringRuleAppServicesArgs
    list of application services
    DefaultRule bool
    If set to true, the default rule is applied
    Departments FirewallFilteringRuleDepartmentsArgs
    list of departments for which rule must be applied
    Description string
    Additional information about the rule
    DestAddresses []string
    DestCountries []string
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    DestIpCategories []string
    DestIpGroups FirewallFilteringRuleDestIpGroupsArgs
    list of destination ip groups
    DeviceGroups FirewallFilteringRuleDeviceGroupsArgs
    This field is applicable for devices that are managed using Zscaler Client Connector.
    DeviceTrustLevels []string
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    Devices FirewallFilteringRuleDevicesArgs
    Name-ID pairs of devices for which rule must be applied.
    EnableFullLogging bool
    Groups FirewallFilteringRuleGroupsArgs
    list of groups for which rule must be applied
    Labels FirewallFilteringRuleLabelsArgs
    list of Labels that are applicable to the rule.
    LocationGroups FirewallFilteringRuleLocationGroupsArgs
    list of locations groups
    Locations FirewallFilteringRuleLocationsArgs
    list of locations for which rule must be applied
    Name string
    Name of the Firewall Filtering policy rule
    NwApplicationGroups FirewallFilteringRuleNwApplicationGroupsArgs
    list of nw application groups
    NwApplications []string
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    NwServiceGroups FirewallFilteringRuleNwServiceGroupsArgs
    list of nw service groups
    NwServices FirewallFilteringRuleNwServicesArgs
    list of nw services
    Order int
    Rule order number of the Firewall Filtering policy rule
    Predefined bool
    If set to true, a predefined rule is applied
    Rank int
    Admin rank of the Firewall Filtering policy rule
    SrcIpGroups FirewallFilteringRuleSrcIpGroupsArgs
    list of source ip groups
    SrcIps []string
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    State string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    TimeWindows FirewallFilteringRuleTimeWindowsArgs
    The time interval in which the Firewall Filtering policy rule applies
    Users FirewallFilteringRuleUsersArgs
    list of users for which rule must be applied
    WorkloadGroups []FirewallFilteringRuleWorkloadGroupArgs
    The list of preconfigured workload groups to which the policy must be applied
    ZpaAppSegments []FirewallFilteringRuleZpaAppSegmentArgs
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action String
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups FirewallFilteringRuleAppServiceGroups
    list of application service groups
    appServices FirewallFilteringRuleAppServices
    list of application services
    defaultRule Boolean
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    description String
    Additional information about the rule
    destAddresses List<String>
    destCountries List<String>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories List<String>
    destIpGroups FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    deviceGroups FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels List<String>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging Boolean
    groups FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    locationGroups FirewallFilteringRuleLocationGroups
    list of locations groups
    locations FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    name String
    Name of the Firewall Filtering policy rule
    nwApplicationGroups FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    nwApplications List<String>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    nwServices FirewallFilteringRuleNwServices
    list of nw services
    order Integer
    Rule order number of the Firewall Filtering policy rule
    predefined Boolean
    If set to true, a predefined rule is applied
    rank Integer
    Admin rank of the Firewall Filtering policy rule
    srcIpGroups FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    srcIps List<String>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state String
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsers
    list of users for which rule must be applied
    workloadGroups List<FirewallFilteringRuleWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments List<FirewallFilteringRuleZpaAppSegment>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups FirewallFilteringRuleAppServiceGroups
    list of application service groups
    appServices FirewallFilteringRuleAppServices
    list of application services
    defaultRule boolean
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    description string
    Additional information about the rule
    destAddresses string[]
    destCountries string[]
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories string[]
    destIpGroups FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    deviceGroups FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels string[]
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging boolean
    groups FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    locationGroups FirewallFilteringRuleLocationGroups
    list of locations groups
    locations FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    name string
    Name of the Firewall Filtering policy rule
    nwApplicationGroups FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    nwApplications string[]
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    nwServices FirewallFilteringRuleNwServices
    list of nw services
    order number
    Rule order number of the Firewall Filtering policy rule
    predefined boolean
    If set to true, a predefined rule is applied
    rank number
    Admin rank of the Firewall Filtering policy rule
    srcIpGroups FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    srcIps string[]
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsers
    list of users for which rule must be applied
    workloadGroups FirewallFilteringRuleWorkloadGroup[]
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments FirewallFilteringRuleZpaAppSegment[]
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action str
    The action the Firewall Filtering policy rule takes when packets match the rule
    app_service_groups FirewallFilteringRuleAppServiceGroupsArgs
    list of application service groups
    app_services FirewallFilteringRuleAppServicesArgs
    list of application services
    default_rule bool
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartmentsArgs
    list of departments for which rule must be applied
    description str
    Additional information about the rule
    dest_addresses Sequence[str]
    dest_countries Sequence[str]
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    dest_ip_categories Sequence[str]
    dest_ip_groups FirewallFilteringRuleDestIpGroupsArgs
    list of destination ip groups
    device_groups FirewallFilteringRuleDeviceGroupsArgs
    This field is applicable for devices that are managed using Zscaler Client Connector.
    device_trust_levels Sequence[str]
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevicesArgs
    Name-ID pairs of devices for which rule must be applied.
    enable_full_logging bool
    groups FirewallFilteringRuleGroupsArgs
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabelsArgs
    list of Labels that are applicable to the rule.
    location_groups FirewallFilteringRuleLocationGroupsArgs
    list of locations groups
    locations FirewallFilteringRuleLocationsArgs
    list of locations for which rule must be applied
    name str
    Name of the Firewall Filtering policy rule
    nw_application_groups FirewallFilteringRuleNwApplicationGroupsArgs
    list of nw application groups
    nw_applications Sequence[str]
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nw_service_groups FirewallFilteringRuleNwServiceGroupsArgs
    list of nw service groups
    nw_services FirewallFilteringRuleNwServicesArgs
    list of nw services
    order int
    Rule order number of the Firewall Filtering policy rule
    predefined bool
    If set to true, a predefined rule is applied
    rank int
    Admin rank of the Firewall Filtering policy rule
    src_ip_groups FirewallFilteringRuleSrcIpGroupsArgs
    list of source ip groups
    src_ips Sequence[str]
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state str
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    time_windows FirewallFilteringRuleTimeWindowsArgs
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsersArgs
    list of users for which rule must be applied
    workload_groups Sequence[FirewallFilteringRuleWorkloadGroupArgs]
    The list of preconfigured workload groups to which the policy must be applied
    zpa_app_segments Sequence[FirewallFilteringRuleZpaAppSegmentArgs]
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action String
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups Property Map
    list of application service groups
    appServices Property Map
    list of application services
    defaultRule Boolean
    If set to true, the default rule is applied
    departments Property Map
    list of departments for which rule must be applied
    description String
    Additional information about the rule
    destAddresses List<String>
    destCountries List<String>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories List<String>
    destIpGroups Property Map
    list of destination ip groups
    deviceGroups Property Map
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels List<String>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices Property Map
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging Boolean
    groups Property Map
    list of groups for which rule must be applied
    labels Property Map
    list of Labels that are applicable to the rule.
    locationGroups Property Map
    list of locations groups
    locations Property Map
    list of locations for which rule must be applied
    name String
    Name of the Firewall Filtering policy rule
    nwApplicationGroups Property Map
    list of nw application groups
    nwApplications List<String>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups Property Map
    list of nw service groups
    nwServices Property Map
    list of nw services
    order Number
    Rule order number of the Firewall Filtering policy rule
    predefined Boolean
    If set to true, a predefined rule is applied
    rank Number
    Admin rank of the Firewall Filtering policy rule
    srcIpGroups Property Map
    list of source ip groups
    srcIps List<String>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state String
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows Property Map
    The time interval in which the Firewall Filtering policy rule applies
    users Property Map
    list of users for which rule must be applied
    workloadGroups List<Property Map>
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments List<Property Map>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the FirewallFilteringRule resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    RuleId int
    Id string
    The provider-assigned unique ID for this managed resource.
    RuleId int
    id String
    The provider-assigned unique ID for this managed resource.
    ruleId Integer
    id string
    The provider-assigned unique ID for this managed resource.
    ruleId number
    id str
    The provider-assigned unique ID for this managed resource.
    rule_id int
    id String
    The provider-assigned unique ID for this managed resource.
    ruleId Number

    Look up Existing FirewallFilteringRule Resource

    Get an existing FirewallFilteringRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: FirewallFilteringRuleState, opts?: CustomResourceOptions): FirewallFilteringRule
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            app_service_groups: Optional[FirewallFilteringRuleAppServiceGroupsArgs] = None,
            app_services: Optional[FirewallFilteringRuleAppServicesArgs] = None,
            default_rule: Optional[bool] = None,
            departments: Optional[FirewallFilteringRuleDepartmentsArgs] = None,
            description: Optional[str] = None,
            dest_addresses: Optional[Sequence[str]] = None,
            dest_countries: Optional[Sequence[str]] = None,
            dest_ip_categories: Optional[Sequence[str]] = None,
            dest_ip_groups: Optional[FirewallFilteringRuleDestIpGroupsArgs] = None,
            device_groups: Optional[FirewallFilteringRuleDeviceGroupsArgs] = None,
            device_trust_levels: Optional[Sequence[str]] = None,
            devices: Optional[FirewallFilteringRuleDevicesArgs] = None,
            enable_full_logging: Optional[bool] = None,
            groups: Optional[FirewallFilteringRuleGroupsArgs] = None,
            labels: Optional[FirewallFilteringRuleLabelsArgs] = None,
            location_groups: Optional[FirewallFilteringRuleLocationGroupsArgs] = None,
            locations: Optional[FirewallFilteringRuleLocationsArgs] = None,
            name: Optional[str] = None,
            nw_application_groups: Optional[FirewallFilteringRuleNwApplicationGroupsArgs] = None,
            nw_applications: Optional[Sequence[str]] = None,
            nw_service_groups: Optional[FirewallFilteringRuleNwServiceGroupsArgs] = None,
            nw_services: Optional[FirewallFilteringRuleNwServicesArgs] = None,
            order: Optional[int] = None,
            predefined: Optional[bool] = None,
            rank: Optional[int] = None,
            rule_id: Optional[int] = None,
            src_ip_groups: Optional[FirewallFilteringRuleSrcIpGroupsArgs] = None,
            src_ips: Optional[Sequence[str]] = None,
            state: Optional[str] = None,
            time_windows: Optional[FirewallFilteringRuleTimeWindowsArgs] = None,
            users: Optional[FirewallFilteringRuleUsersArgs] = None,
            workload_groups: Optional[Sequence[FirewallFilteringRuleWorkloadGroupArgs]] = None,
            zpa_app_segments: Optional[Sequence[FirewallFilteringRuleZpaAppSegmentArgs]] = None) -> FirewallFilteringRule
    func GetFirewallFilteringRule(ctx *Context, name string, id IDInput, state *FirewallFilteringRuleState, opts ...ResourceOption) (*FirewallFilteringRule, error)
    public static FirewallFilteringRule Get(string name, Input<string> id, FirewallFilteringRuleState? state, CustomResourceOptions? opts = null)
    public static FirewallFilteringRule get(String name, Output<String> id, FirewallFilteringRuleState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    AppServiceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleAppServiceGroups
    list of application service groups
    AppServices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleAppServices
    list of application services
    DefaultRule bool
    If set to true, the default rule is applied
    Departments zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    Description string
    Additional information about the rule
    DestAddresses List<string>
    DestCountries List<string>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    DestIpCategories List<string>
    DestIpGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    DeviceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    DeviceTrustLevels List<string>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    Devices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    EnableFullLogging bool
    Groups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    Labels zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    LocationGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLocationGroups
    list of locations groups
    Locations zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    Name string
    Name of the Firewall Filtering policy rule
    NwApplicationGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    NwApplications List<string>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    NwServiceGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    NwServices zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleNwServices
    list of nw services
    Order int
    Rule order number of the Firewall Filtering policy rule
    Predefined bool
    If set to true, a predefined rule is applied
    Rank int
    Admin rank of the Firewall Filtering policy rule
    RuleId int
    SrcIpGroups zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    SrcIps List<string>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    State string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    TimeWindows zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    Users zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleUsers
    list of users for which rule must be applied
    WorkloadGroups List<zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    ZpaAppSegments List<zscaler.PulumiPackage.Zia.Inputs.FirewallFilteringRuleZpaAppSegment>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    Action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    AppServiceGroups FirewallFilteringRuleAppServiceGroupsArgs
    list of application service groups
    AppServices FirewallFilteringRuleAppServicesArgs
    list of application services
    DefaultRule bool
    If set to true, the default rule is applied
    Departments FirewallFilteringRuleDepartmentsArgs
    list of departments for which rule must be applied
    Description string
    Additional information about the rule
    DestAddresses []string
    DestCountries []string
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    DestIpCategories []string
    DestIpGroups FirewallFilteringRuleDestIpGroupsArgs
    list of destination ip groups
    DeviceGroups FirewallFilteringRuleDeviceGroupsArgs
    This field is applicable for devices that are managed using Zscaler Client Connector.
    DeviceTrustLevels []string
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    Devices FirewallFilteringRuleDevicesArgs
    Name-ID pairs of devices for which rule must be applied.
    EnableFullLogging bool
    Groups FirewallFilteringRuleGroupsArgs
    list of groups for which rule must be applied
    Labels FirewallFilteringRuleLabelsArgs
    list of Labels that are applicable to the rule.
    LocationGroups FirewallFilteringRuleLocationGroupsArgs
    list of locations groups
    Locations FirewallFilteringRuleLocationsArgs
    list of locations for which rule must be applied
    Name string
    Name of the Firewall Filtering policy rule
    NwApplicationGroups FirewallFilteringRuleNwApplicationGroupsArgs
    list of nw application groups
    NwApplications []string
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    NwServiceGroups FirewallFilteringRuleNwServiceGroupsArgs
    list of nw service groups
    NwServices FirewallFilteringRuleNwServicesArgs
    list of nw services
    Order int
    Rule order number of the Firewall Filtering policy rule
    Predefined bool
    If set to true, a predefined rule is applied
    Rank int
    Admin rank of the Firewall Filtering policy rule
    RuleId int
    SrcIpGroups FirewallFilteringRuleSrcIpGroupsArgs
    list of source ip groups
    SrcIps []string
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    State string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    TimeWindows FirewallFilteringRuleTimeWindowsArgs
    The time interval in which the Firewall Filtering policy rule applies
    Users FirewallFilteringRuleUsersArgs
    list of users for which rule must be applied
    WorkloadGroups []FirewallFilteringRuleWorkloadGroupArgs
    The list of preconfigured workload groups to which the policy must be applied
    ZpaAppSegments []FirewallFilteringRuleZpaAppSegmentArgs
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action String
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups FirewallFilteringRuleAppServiceGroups
    list of application service groups
    appServices FirewallFilteringRuleAppServices
    list of application services
    defaultRule Boolean
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    description String
    Additional information about the rule
    destAddresses List<String>
    destCountries List<String>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories List<String>
    destIpGroups FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    deviceGroups FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels List<String>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging Boolean
    groups FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    locationGroups FirewallFilteringRuleLocationGroups
    list of locations groups
    locations FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    name String
    Name of the Firewall Filtering policy rule
    nwApplicationGroups FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    nwApplications List<String>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    nwServices FirewallFilteringRuleNwServices
    list of nw services
    order Integer
    Rule order number of the Firewall Filtering policy rule
    predefined Boolean
    If set to true, a predefined rule is applied
    rank Integer
    Admin rank of the Firewall Filtering policy rule
    ruleId Integer
    srcIpGroups FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    srcIps List<String>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state String
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsers
    list of users for which rule must be applied
    workloadGroups List<FirewallFilteringRuleWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments List<FirewallFilteringRuleZpaAppSegment>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action string
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups FirewallFilteringRuleAppServiceGroups
    list of application service groups
    appServices FirewallFilteringRuleAppServices
    list of application services
    defaultRule boolean
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartments
    list of departments for which rule must be applied
    description string
    Additional information about the rule
    destAddresses string[]
    destCountries string[]
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories string[]
    destIpGroups FirewallFilteringRuleDestIpGroups
    list of destination ip groups
    deviceGroups FirewallFilteringRuleDeviceGroups
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels string[]
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevices
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging boolean
    groups FirewallFilteringRuleGroups
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabels
    list of Labels that are applicable to the rule.
    locationGroups FirewallFilteringRuleLocationGroups
    list of locations groups
    locations FirewallFilteringRuleLocations
    list of locations for which rule must be applied
    name string
    Name of the Firewall Filtering policy rule
    nwApplicationGroups FirewallFilteringRuleNwApplicationGroups
    list of nw application groups
    nwApplications string[]
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups FirewallFilteringRuleNwServiceGroups
    list of nw service groups
    nwServices FirewallFilteringRuleNwServices
    list of nw services
    order number
    Rule order number of the Firewall Filtering policy rule
    predefined boolean
    If set to true, a predefined rule is applied
    rank number
    Admin rank of the Firewall Filtering policy rule
    ruleId number
    srcIpGroups FirewallFilteringRuleSrcIpGroups
    list of source ip groups
    srcIps string[]
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state string
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows FirewallFilteringRuleTimeWindows
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsers
    list of users for which rule must be applied
    workloadGroups FirewallFilteringRuleWorkloadGroup[]
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments FirewallFilteringRuleZpaAppSegment[]
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action str
    The action the Firewall Filtering policy rule takes when packets match the rule
    app_service_groups FirewallFilteringRuleAppServiceGroupsArgs
    list of application service groups
    app_services FirewallFilteringRuleAppServicesArgs
    list of application services
    default_rule bool
    If set to true, the default rule is applied
    departments FirewallFilteringRuleDepartmentsArgs
    list of departments for which rule must be applied
    description str
    Additional information about the rule
    dest_addresses Sequence[str]
    dest_countries Sequence[str]
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    dest_ip_categories Sequence[str]
    dest_ip_groups FirewallFilteringRuleDestIpGroupsArgs
    list of destination ip groups
    device_groups FirewallFilteringRuleDeviceGroupsArgs
    This field is applicable for devices that are managed using Zscaler Client Connector.
    device_trust_levels Sequence[str]
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices FirewallFilteringRuleDevicesArgs
    Name-ID pairs of devices for which rule must be applied.
    enable_full_logging bool
    groups FirewallFilteringRuleGroupsArgs
    list of groups for which rule must be applied
    labels FirewallFilteringRuleLabelsArgs
    list of Labels that are applicable to the rule.
    location_groups FirewallFilteringRuleLocationGroupsArgs
    list of locations groups
    locations FirewallFilteringRuleLocationsArgs
    list of locations for which rule must be applied
    name str
    Name of the Firewall Filtering policy rule
    nw_application_groups FirewallFilteringRuleNwApplicationGroupsArgs
    list of nw application groups
    nw_applications Sequence[str]
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nw_service_groups FirewallFilteringRuleNwServiceGroupsArgs
    list of nw service groups
    nw_services FirewallFilteringRuleNwServicesArgs
    list of nw services
    order int
    Rule order number of the Firewall Filtering policy rule
    predefined bool
    If set to true, a predefined rule is applied
    rank int
    Admin rank of the Firewall Filtering policy rule
    rule_id int
    src_ip_groups FirewallFilteringRuleSrcIpGroupsArgs
    list of source ip groups
    src_ips Sequence[str]
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state str
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    time_windows FirewallFilteringRuleTimeWindowsArgs
    The time interval in which the Firewall Filtering policy rule applies
    users FirewallFilteringRuleUsersArgs
    list of users for which rule must be applied
    workload_groups Sequence[FirewallFilteringRuleWorkloadGroupArgs]
    The list of preconfigured workload groups to which the policy must be applied
    zpa_app_segments Sequence[FirewallFilteringRuleZpaAppSegmentArgs]
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.
    action String
    The action the Firewall Filtering policy rule takes when packets match the rule
    appServiceGroups Property Map
    list of application service groups
    appServices Property Map
    list of application services
    defaultRule Boolean
    If set to true, the default rule is applied
    departments Property Map
    list of departments for which rule must be applied
    description String
    Additional information about the rule
    destAddresses List<String>
    destCountries List<String>
    Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries.
    destIpCategories List<String>
    destIpGroups Property Map
    list of destination ip groups
    deviceGroups Property Map
    This field is applicable for devices that are managed using Zscaler Client Connector.
    deviceTrustLevels List<String>
    List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation.
    devices Property Map
    Name-ID pairs of devices for which rule must be applied.
    enableFullLogging Boolean
    groups Property Map
    list of groups for which rule must be applied
    labels Property Map
    list of Labels that are applicable to the rule.
    locationGroups Property Map
    list of locations groups
    locations Property Map
    list of locations for which rule must be applied
    name String
    Name of the Firewall Filtering policy rule
    nwApplicationGroups Property Map
    list of nw application groups
    nwApplications List<String>
    User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application.
    nwServiceGroups Property Map
    list of nw service groups
    nwServices Property Map
    list of nw services
    order Number
    Rule order number of the Firewall Filtering policy rule
    predefined Boolean
    If set to true, a predefined rule is applied
    rank Number
    Admin rank of the Firewall Filtering policy rule
    ruleId Number
    srcIpGroups Property Map
    list of source ip groups
    srcIps List<String>
    User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address.
    state String
    Determines whether the Firewall Filtering policy rule is enabled or disabled
    timeWindows Property Map
    The time interval in which the Firewall Filtering policy rule applies
    users Property Map
    list of users for which rule must be applied
    workloadGroups List<Property Map>
    The list of preconfigured workload groups to which the policy must be applied
    zpaAppSegments List<Property Map>
    The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA Gateway forwarding method.

    Supporting Types

    FirewallFilteringRuleAppServiceGroups, FirewallFilteringRuleAppServiceGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleAppServices, FirewallFilteringRuleAppServicesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleDepartments, FirewallFilteringRuleDepartmentsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleDestIpGroups, FirewallFilteringRuleDestIpGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleDeviceGroups, FirewallFilteringRuleDeviceGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleDevices, FirewallFilteringRuleDevicesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleGroups, FirewallFilteringRuleGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleLabels, FirewallFilteringRuleLabelsArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    FirewallFilteringRuleLocationGroups, FirewallFilteringRuleLocationGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleLocations, FirewallFilteringRuleLocationsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleNwApplicationGroups, FirewallFilteringRuleNwApplicationGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleNwServiceGroups, FirewallFilteringRuleNwServiceGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleNwServices, FirewallFilteringRuleNwServicesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleSrcIpGroups, FirewallFilteringRuleSrcIpGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleTimeWindows, FirewallFilteringRuleTimeWindowsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleUsers, FirewallFilteringRuleUsersArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    FirewallFilteringRuleWorkloadGroup, FirewallFilteringRuleWorkloadGroupArgs

    Id int
    The unique identifier for the resource.
    Name string
    The name of the resource.
    Id int
    The unique identifier for the resource.
    Name string
    The name of the resource.
    id Integer
    The unique identifier for the resource.
    name String
    The name of the resource.
    id number
    The unique identifier for the resource.
    name string
    The name of the resource.
    id int
    The unique identifier for the resource.
    name str
    The name of the resource.
    id Number
    The unique identifier for the resource.
    name String
    The name of the resource.

    FirewallFilteringRuleZpaAppSegment, FirewallFilteringRuleZpaAppSegmentArgs

    ExternalId string
    External ID of the application segment.
    Name string
    Name of the application segment.
    ExternalId string
    External ID of the application segment.
    Name string
    Name of the application segment.
    externalId String
    External ID of the application segment.
    name String
    Name of the application segment.
    externalId string
    External ID of the application segment.
    name string
    Name of the application segment.
    external_id str
    External ID of the application segment.
    name str
    Name of the application segment.
    externalId String
    External ID of the application segment.
    name String
    Name of the application segment.

    Import

    Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.

    Visit

    zia_firewall_filtering_rule can be imported by using <RULE ID> or <RULE NAME> as the import ID.

    For example:

    $ pulumi import zia:index/firewallFilteringRule:FirewallFilteringRule example <rule_id>
    

    or

    $ pulumi import zia:index/firewallFilteringRule:FirewallFilteringRule example <rule_name>
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    zia zscaler/pulumi-zia
    License
    MIT
    Notes
    This Pulumi package is based on the zia Terraform Provider.
    zia logo
    Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler