oci.Core.SecurityList
Explore with Pulumi AI
This resource provides the Security List resource in Oracle Cloud Infrastructure Core service.
Creates a new security list for the specified VCN. For more information about security lists, see Security Lists. For information on the number of rules you can have in a security list, see Service Limits.
For the purposes of access control, you must provide the OCID of the compartment where you want the security list to reside. Notice that the security list doesn’t have to be in the same compartment as the VCN, subnets, or other Networking Service components. If you’re not sure which compartment to use, put the security list in the same compartment as the VCN. For more information about compartments and access control, see Overview of the IAM Service. For information about OCIDs, see Resource Identifiers.
You may optionally specify a display name for the security list, otherwise a default is provided. It does not have to be unique, and you can change it. Avoid entering confidential information.
For more information on configuring a VCN’s default security list, see Managing Default VCN Resources
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecurityList = new oci.core.SecurityList("test_security_list", {
compartmentId: compartmentId,
vcnId: testVcn.id,
definedTags: {
"Operations.CostCenter": "42",
},
displayName: securityListDisplayName,
egressSecurityRules: [{
destination: securityListEgressSecurityRulesDestination,
protocol: securityListEgressSecurityRulesProtocol,
description: securityListEgressSecurityRulesDescription,
destinationType: securityListEgressSecurityRulesDestinationType,
icmpOptions: {
type: securityListEgressSecurityRulesIcmpOptionsType,
code: securityListEgressSecurityRulesIcmpOptionsCode,
},
stateless: securityListEgressSecurityRulesStateless,
tcpOptions: {
max: securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax,
min: securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin,
sourcePortRange: {
max: securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax,
min: securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin,
},
},
udpOptions: {
max: securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax,
min: securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin,
sourcePortRange: {
max: securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax,
min: securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin,
},
},
}],
freeformTags: {
Department: "Finance",
},
ingressSecurityRules: [{
protocol: securityListIngressSecurityRulesProtocol,
source: securityListIngressSecurityRulesSource,
description: securityListIngressSecurityRulesDescription,
icmpOptions: {
type: securityListIngressSecurityRulesIcmpOptionsType,
code: securityListIngressSecurityRulesIcmpOptionsCode,
},
sourceType: securityListIngressSecurityRulesSourceType,
stateless: securityListIngressSecurityRulesStateless,
tcpOptions: {
max: securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax,
min: securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin,
sourcePortRange: {
max: securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax,
min: securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin,
},
},
udpOptions: {
max: securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax,
min: securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin,
sourcePortRange: {
max: securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax,
min: securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin,
},
},
}],
});
import pulumi
import pulumi_oci as oci
test_security_list = oci.core.SecurityList("test_security_list",
compartment_id=compartment_id,
vcn_id=test_vcn["id"],
defined_tags={
"Operations.CostCenter": "42",
},
display_name=security_list_display_name,
egress_security_rules=[oci.core.SecurityListEgressSecurityRuleArgs(
destination=security_list_egress_security_rules_destination,
protocol=security_list_egress_security_rules_protocol,
description=security_list_egress_security_rules_description,
destination_type=security_list_egress_security_rules_destination_type,
icmp_options=oci.core.SecurityListEgressSecurityRuleIcmpOptionsArgs(
type=security_list_egress_security_rules_icmp_options_type,
code=security_list_egress_security_rules_icmp_options_code,
),
stateless=security_list_egress_security_rules_stateless,
tcp_options=oci.core.SecurityListEgressSecurityRuleTcpOptionsArgs(
max=security_list_egress_security_rules_tcp_options_destination_port_range_max,
min=security_list_egress_security_rules_tcp_options_destination_port_range_min,
source_port_range=oci.core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs(
max=security_list_egress_security_rules_tcp_options_source_port_range_max,
min=security_list_egress_security_rules_tcp_options_source_port_range_min,
),
),
udp_options=oci.core.SecurityListEgressSecurityRuleUdpOptionsArgs(
max=security_list_egress_security_rules_udp_options_destination_port_range_max,
min=security_list_egress_security_rules_udp_options_destination_port_range_min,
source_port_range=oci.core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs(
max=security_list_egress_security_rules_udp_options_source_port_range_max,
min=security_list_egress_security_rules_udp_options_source_port_range_min,
),
),
)],
freeform_tags={
"Department": "Finance",
},
ingress_security_rules=[oci.core.SecurityListIngressSecurityRuleArgs(
protocol=security_list_ingress_security_rules_protocol,
source=security_list_ingress_security_rules_source,
description=security_list_ingress_security_rules_description,
icmp_options=oci.core.SecurityListIngressSecurityRuleIcmpOptionsArgs(
type=security_list_ingress_security_rules_icmp_options_type,
code=security_list_ingress_security_rules_icmp_options_code,
),
source_type=security_list_ingress_security_rules_source_type,
stateless=security_list_ingress_security_rules_stateless,
tcp_options=oci.core.SecurityListIngressSecurityRuleTcpOptionsArgs(
max=security_list_ingress_security_rules_tcp_options_destination_port_range_max,
min=security_list_ingress_security_rules_tcp_options_destination_port_range_min,
source_port_range=oci.core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs(
max=security_list_ingress_security_rules_tcp_options_source_port_range_max,
min=security_list_ingress_security_rules_tcp_options_source_port_range_min,
),
),
udp_options=oci.core.SecurityListIngressSecurityRuleUdpOptionsArgs(
max=security_list_ingress_security_rules_udp_options_destination_port_range_max,
min=security_list_ingress_security_rules_udp_options_destination_port_range_min,
source_port_range=oci.core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs(
max=security_list_ingress_security_rules_udp_options_source_port_range_max,
min=security_list_ingress_security_rules_udp_options_source_port_range_min,
),
),
)])
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Core"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Core.NewSecurityList(ctx, "test_security_list", &Core.SecurityListArgs{
CompartmentId: pulumi.Any(compartmentId),
VcnId: pulumi.Any(testVcn.Id),
DefinedTags: pulumi.Map{
"Operations.CostCenter": pulumi.Any("42"),
},
DisplayName: pulumi.Any(securityListDisplayName),
EgressSecurityRules: core.SecurityListEgressSecurityRuleArray{
&core.SecurityListEgressSecurityRuleArgs{
Destination: pulumi.Any(securityListEgressSecurityRulesDestination),
Protocol: pulumi.Any(securityListEgressSecurityRulesProtocol),
Description: pulumi.Any(securityListEgressSecurityRulesDescription),
DestinationType: pulumi.Any(securityListEgressSecurityRulesDestinationType),
IcmpOptions: &core.SecurityListEgressSecurityRuleIcmpOptionsArgs{
Type: pulumi.Any(securityListEgressSecurityRulesIcmpOptionsType),
Code: pulumi.Any(securityListEgressSecurityRulesIcmpOptionsCode),
},
Stateless: pulumi.Any(securityListEgressSecurityRulesStateless),
TcpOptions: &core.SecurityListEgressSecurityRuleTcpOptionsArgs{
Max: pulumi.Any(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax),
Min: pulumi.Any(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin),
SourcePortRange: &core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs{
Max: pulumi.Any(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax),
Min: pulumi.Any(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin),
},
},
UdpOptions: &core.SecurityListEgressSecurityRuleUdpOptionsArgs{
Max: pulumi.Any(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax),
Min: pulumi.Any(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin),
SourcePortRange: &core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs{
Max: pulumi.Any(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax),
Min: pulumi.Any(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin),
},
},
},
},
FreeformTags: pulumi.Map{
"Department": pulumi.Any("Finance"),
},
IngressSecurityRules: core.SecurityListIngressSecurityRuleArray{
&core.SecurityListIngressSecurityRuleArgs{
Protocol: pulumi.Any(securityListIngressSecurityRulesProtocol),
Source: pulumi.Any(securityListIngressSecurityRulesSource),
Description: pulumi.Any(securityListIngressSecurityRulesDescription),
IcmpOptions: &core.SecurityListIngressSecurityRuleIcmpOptionsArgs{
Type: pulumi.Any(securityListIngressSecurityRulesIcmpOptionsType),
Code: pulumi.Any(securityListIngressSecurityRulesIcmpOptionsCode),
},
SourceType: pulumi.Any(securityListIngressSecurityRulesSourceType),
Stateless: pulumi.Any(securityListIngressSecurityRulesStateless),
TcpOptions: &core.SecurityListIngressSecurityRuleTcpOptionsArgs{
Max: pulumi.Any(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax),
Min: pulumi.Any(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin),
SourcePortRange: &core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs{
Max: pulumi.Any(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax),
Min: pulumi.Any(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin),
},
},
UdpOptions: &core.SecurityListIngressSecurityRuleUdpOptionsArgs{
Max: pulumi.Any(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax),
Min: pulumi.Any(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin),
SourcePortRange: &core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs{
Max: pulumi.Any(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax),
Min: pulumi.Any(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin),
},
},
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testSecurityList = new Oci.Core.SecurityList("test_security_list", new()
{
CompartmentId = compartmentId,
VcnId = testVcn.Id,
DefinedTags =
{
{ "Operations.CostCenter", "42" },
},
DisplayName = securityListDisplayName,
EgressSecurityRules = new[]
{
new Oci.Core.Inputs.SecurityListEgressSecurityRuleArgs
{
Destination = securityListEgressSecurityRulesDestination,
Protocol = securityListEgressSecurityRulesProtocol,
Description = securityListEgressSecurityRulesDescription,
DestinationType = securityListEgressSecurityRulesDestinationType,
IcmpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs
{
Type = securityListEgressSecurityRulesIcmpOptionsType,
Code = securityListEgressSecurityRulesIcmpOptionsCode,
},
Stateless = securityListEgressSecurityRulesStateless,
TcpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsArgs
{
Max = securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax,
Min = securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin,
SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs
{
Max = securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax,
Min = securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin,
},
},
UdpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsArgs
{
Max = securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax,
Min = securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin,
SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs
{
Max = securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax,
Min = securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin,
},
},
},
},
FreeformTags =
{
{ "Department", "Finance" },
},
IngressSecurityRules = new[]
{
new Oci.Core.Inputs.SecurityListIngressSecurityRuleArgs
{
Protocol = securityListIngressSecurityRulesProtocol,
Source = securityListIngressSecurityRulesSource,
Description = securityListIngressSecurityRulesDescription,
IcmpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs
{
Type = securityListIngressSecurityRulesIcmpOptionsType,
Code = securityListIngressSecurityRulesIcmpOptionsCode,
},
SourceType = securityListIngressSecurityRulesSourceType,
Stateless = securityListIngressSecurityRulesStateless,
TcpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsArgs
{
Max = securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax,
Min = securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin,
SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs
{
Max = securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax,
Min = securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin,
},
},
UdpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsArgs
{
Max = securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax,
Min = securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin,
SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs
{
Max = securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax,
Min = securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin,
},
},
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Core.SecurityList;
import com.pulumi.oci.Core.SecurityListArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleTcpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleUdpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleTcpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleUdpOptionsArgs;
import com.pulumi.oci.Core.inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testSecurityList = new SecurityList("testSecurityList", SecurityListArgs.builder()
.compartmentId(compartmentId)
.vcnId(testVcn.id())
.definedTags(Map.of("Operations.CostCenter", "42"))
.displayName(securityListDisplayName)
.egressSecurityRules(SecurityListEgressSecurityRuleArgs.builder()
.destination(securityListEgressSecurityRulesDestination)
.protocol(securityListEgressSecurityRulesProtocol)
.description(securityListEgressSecurityRulesDescription)
.destinationType(securityListEgressSecurityRulesDestinationType)
.icmpOptions(SecurityListEgressSecurityRuleIcmpOptionsArgs.builder()
.type(securityListEgressSecurityRulesIcmpOptionsType)
.code(securityListEgressSecurityRulesIcmpOptionsCode)
.build())
.stateless(securityListEgressSecurityRulesStateless)
.tcpOptions(SecurityListEgressSecurityRuleTcpOptionsArgs.builder()
.max(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax)
.min(securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin)
.sourcePortRange(SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
.max(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax)
.min(securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin)
.build())
.build())
.udpOptions(SecurityListEgressSecurityRuleUdpOptionsArgs.builder()
.max(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax)
.min(securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin)
.sourcePortRange(SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
.max(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax)
.min(securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin)
.build())
.build())
.build())
.freeformTags(Map.of("Department", "Finance"))
.ingressSecurityRules(SecurityListIngressSecurityRuleArgs.builder()
.protocol(securityListIngressSecurityRulesProtocol)
.source(securityListIngressSecurityRulesSource)
.description(securityListIngressSecurityRulesDescription)
.icmpOptions(SecurityListIngressSecurityRuleIcmpOptionsArgs.builder()
.type(securityListIngressSecurityRulesIcmpOptionsType)
.code(securityListIngressSecurityRulesIcmpOptionsCode)
.build())
.sourceType(securityListIngressSecurityRulesSourceType)
.stateless(securityListIngressSecurityRulesStateless)
.tcpOptions(SecurityListIngressSecurityRuleTcpOptionsArgs.builder()
.max(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax)
.min(securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin)
.sourcePortRange(SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
.max(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax)
.min(securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin)
.build())
.build())
.udpOptions(SecurityListIngressSecurityRuleUdpOptionsArgs.builder()
.max(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax)
.min(securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin)
.sourcePortRange(SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
.max(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax)
.min(securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin)
.build())
.build())
.build())
.build());
}
}
resources:
testSecurityList:
type: oci:Core:SecurityList
name: test_security_list
properties:
compartmentId: ${compartmentId}
vcnId: ${testVcn.id}
definedTags:
Operations.CostCenter: '42'
displayName: ${securityListDisplayName}
egressSecurityRules:
- destination: ${securityListEgressSecurityRulesDestination}
protocol: ${securityListEgressSecurityRulesProtocol}
description: ${securityListEgressSecurityRulesDescription}
destinationType: ${securityListEgressSecurityRulesDestinationType}
icmpOptions:
type: ${securityListEgressSecurityRulesIcmpOptionsType}
code: ${securityListEgressSecurityRulesIcmpOptionsCode}
stateless: ${securityListEgressSecurityRulesStateless}
tcpOptions:
max: ${securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMax}
min: ${securityListEgressSecurityRulesTcpOptionsDestinationPortRangeMin}
sourcePortRange:
max: ${securityListEgressSecurityRulesTcpOptionsSourcePortRangeMax}
min: ${securityListEgressSecurityRulesTcpOptionsSourcePortRangeMin}
udpOptions:
max: ${securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMax}
min: ${securityListEgressSecurityRulesUdpOptionsDestinationPortRangeMin}
sourcePortRange:
max: ${securityListEgressSecurityRulesUdpOptionsSourcePortRangeMax}
min: ${securityListEgressSecurityRulesUdpOptionsSourcePortRangeMin}
freeformTags:
Department: Finance
ingressSecurityRules:
- protocol: ${securityListIngressSecurityRulesProtocol}
source: ${securityListIngressSecurityRulesSource}
description: ${securityListIngressSecurityRulesDescription}
icmpOptions:
type: ${securityListIngressSecurityRulesIcmpOptionsType}
code: ${securityListIngressSecurityRulesIcmpOptionsCode}
sourceType: ${securityListIngressSecurityRulesSourceType}
stateless: ${securityListIngressSecurityRulesStateless}
tcpOptions:
max: ${securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMax}
min: ${securityListIngressSecurityRulesTcpOptionsDestinationPortRangeMin}
sourcePortRange:
max: ${securityListIngressSecurityRulesTcpOptionsSourcePortRangeMax}
min: ${securityListIngressSecurityRulesTcpOptionsSourcePortRangeMin}
udpOptions:
max: ${securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMax}
min: ${securityListIngressSecurityRulesUdpOptionsDestinationPortRangeMin}
sourcePortRange:
max: ${securityListIngressSecurityRulesUdpOptionsSourcePortRangeMax}
min: ${securityListIngressSecurityRulesUdpOptionsSourcePortRangeMin}
Create SecurityList Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecurityList(name: string, args: SecurityListArgs, opts?: CustomResourceOptions);
@overload
def SecurityList(resource_name: str,
args: SecurityListArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecurityList(resource_name: str,
opts: Optional[ResourceOptions] = None,
compartment_id: Optional[str] = None,
vcn_id: Optional[str] = None,
defined_tags: Optional[Mapping[str, Any]] = None,
display_name: Optional[str] = None,
egress_security_rules: Optional[Sequence[_core.SecurityListEgressSecurityRuleArgs]] = None,
freeform_tags: Optional[Mapping[str, Any]] = None,
ingress_security_rules: Optional[Sequence[_core.SecurityListIngressSecurityRuleArgs]] = None)
func NewSecurityList(ctx *Context, name string, args SecurityListArgs, opts ...ResourceOption) (*SecurityList, error)
public SecurityList(string name, SecurityListArgs args, CustomResourceOptions? opts = null)
public SecurityList(String name, SecurityListArgs args)
public SecurityList(String name, SecurityListArgs args, CustomResourceOptions options)
type: oci:Core:SecurityList
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecurityListArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securityListResource = new Oci.Core.SecurityList("securityListResource", new()
{
CompartmentId = "string",
VcnId = "string",
DefinedTags =
{
{ "string", "any" },
},
DisplayName = "string",
EgressSecurityRules = new[]
{
new Oci.Core.Inputs.SecurityListEgressSecurityRuleArgs
{
Destination = "string",
Protocol = "string",
Description = "string",
DestinationType = "string",
IcmpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleIcmpOptionsArgs
{
Type = 0,
Code = 0,
},
Stateless = false,
TcpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsArgs
{
Max = 0,
Min = 0,
SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs
{
Max = 0,
Min = 0,
},
},
UdpOptions = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsArgs
{
Max = 0,
Min = 0,
SourcePortRange = new Oci.Core.Inputs.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs
{
Max = 0,
Min = 0,
},
},
},
},
FreeformTags =
{
{ "string", "any" },
},
IngressSecurityRules = new[]
{
new Oci.Core.Inputs.SecurityListIngressSecurityRuleArgs
{
Protocol = "string",
Source = "string",
Description = "string",
IcmpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleIcmpOptionsArgs
{
Type = 0,
Code = 0,
},
SourceType = "string",
Stateless = false,
TcpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsArgs
{
Max = 0,
Min = 0,
SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs
{
Max = 0,
Min = 0,
},
},
UdpOptions = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsArgs
{
Max = 0,
Min = 0,
SourcePortRange = new Oci.Core.Inputs.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs
{
Max = 0,
Min = 0,
},
},
},
},
});
example, err := Core.NewSecurityList(ctx, "securityListResource", &Core.SecurityListArgs{
CompartmentId: pulumi.String("string"),
VcnId: pulumi.String("string"),
DefinedTags: pulumi.Map{
"string": pulumi.Any("any"),
},
DisplayName: pulumi.String("string"),
EgressSecurityRules: core.SecurityListEgressSecurityRuleArray{
&core.SecurityListEgressSecurityRuleArgs{
Destination: pulumi.String("string"),
Protocol: pulumi.String("string"),
Description: pulumi.String("string"),
DestinationType: pulumi.String("string"),
IcmpOptions: &core.SecurityListEgressSecurityRuleIcmpOptionsArgs{
Type: pulumi.Int(0),
Code: pulumi.Int(0),
},
Stateless: pulumi.Bool(false),
TcpOptions: &core.SecurityListEgressSecurityRuleTcpOptionsArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
SourcePortRange: &core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
},
},
UdpOptions: &core.SecurityListEgressSecurityRuleUdpOptionsArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
SourcePortRange: &core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
},
},
},
},
FreeformTags: pulumi.Map{
"string": pulumi.Any("any"),
},
IngressSecurityRules: core.SecurityListIngressSecurityRuleArray{
&core.SecurityListIngressSecurityRuleArgs{
Protocol: pulumi.String("string"),
Source: pulumi.String("string"),
Description: pulumi.String("string"),
IcmpOptions: &core.SecurityListIngressSecurityRuleIcmpOptionsArgs{
Type: pulumi.Int(0),
Code: pulumi.Int(0),
},
SourceType: pulumi.String("string"),
Stateless: pulumi.Bool(false),
TcpOptions: &core.SecurityListIngressSecurityRuleTcpOptionsArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
SourcePortRange: &core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
},
},
UdpOptions: &core.SecurityListIngressSecurityRuleUdpOptionsArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
SourcePortRange: &core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs{
Max: pulumi.Int(0),
Min: pulumi.Int(0),
},
},
},
},
})
var securityListResource = new SecurityList("securityListResource", SecurityListArgs.builder()
.compartmentId("string")
.vcnId("string")
.definedTags(Map.of("string", "any"))
.displayName("string")
.egressSecurityRules(SecurityListEgressSecurityRuleArgs.builder()
.destination("string")
.protocol("string")
.description("string")
.destinationType("string")
.icmpOptions(SecurityListEgressSecurityRuleIcmpOptionsArgs.builder()
.type(0)
.code(0)
.build())
.stateless(false)
.tcpOptions(SecurityListEgressSecurityRuleTcpOptionsArgs.builder()
.max(0)
.min(0)
.sourcePortRange(SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
.max(0)
.min(0)
.build())
.build())
.udpOptions(SecurityListEgressSecurityRuleUdpOptionsArgs.builder()
.max(0)
.min(0)
.sourcePortRange(SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
.max(0)
.min(0)
.build())
.build())
.build())
.freeformTags(Map.of("string", "any"))
.ingressSecurityRules(SecurityListIngressSecurityRuleArgs.builder()
.protocol("string")
.source("string")
.description("string")
.icmpOptions(SecurityListIngressSecurityRuleIcmpOptionsArgs.builder()
.type(0)
.code(0)
.build())
.sourceType("string")
.stateless(false)
.tcpOptions(SecurityListIngressSecurityRuleTcpOptionsArgs.builder()
.max(0)
.min(0)
.sourcePortRange(SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs.builder()
.max(0)
.min(0)
.build())
.build())
.udpOptions(SecurityListIngressSecurityRuleUdpOptionsArgs.builder()
.max(0)
.min(0)
.sourcePortRange(SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs.builder()
.max(0)
.min(0)
.build())
.build())
.build())
.build());
security_list_resource = oci.core.SecurityList("securityListResource",
compartment_id="string",
vcn_id="string",
defined_tags={
"string": "any",
},
display_name="string",
egress_security_rules=[oci.core.SecurityListEgressSecurityRuleArgs(
destination="string",
protocol="string",
description="string",
destination_type="string",
icmp_options=oci.core.SecurityListEgressSecurityRuleIcmpOptionsArgs(
type=0,
code=0,
),
stateless=False,
tcp_options=oci.core.SecurityListEgressSecurityRuleTcpOptionsArgs(
max=0,
min=0,
source_port_range=oci.core.SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs(
max=0,
min=0,
),
),
udp_options=oci.core.SecurityListEgressSecurityRuleUdpOptionsArgs(
max=0,
min=0,
source_port_range=oci.core.SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs(
max=0,
min=0,
),
),
)],
freeform_tags={
"string": "any",
},
ingress_security_rules=[oci.core.SecurityListIngressSecurityRuleArgs(
protocol="string",
source="string",
description="string",
icmp_options=oci.core.SecurityListIngressSecurityRuleIcmpOptionsArgs(
type=0,
code=0,
),
source_type="string",
stateless=False,
tcp_options=oci.core.SecurityListIngressSecurityRuleTcpOptionsArgs(
max=0,
min=0,
source_port_range=oci.core.SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs(
max=0,
min=0,
),
),
udp_options=oci.core.SecurityListIngressSecurityRuleUdpOptionsArgs(
max=0,
min=0,
source_port_range=oci.core.SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs(
max=0,
min=0,
),
),
)])
const securityListResource = new oci.core.SecurityList("securityListResource", {
compartmentId: "string",
vcnId: "string",
definedTags: {
string: "any",
},
displayName: "string",
egressSecurityRules: [{
destination: "string",
protocol: "string",
description: "string",
destinationType: "string",
icmpOptions: {
type: 0,
code: 0,
},
stateless: false,
tcpOptions: {
max: 0,
min: 0,
sourcePortRange: {
max: 0,
min: 0,
},
},
udpOptions: {
max: 0,
min: 0,
sourcePortRange: {
max: 0,
min: 0,
},
},
}],
freeformTags: {
string: "any",
},
ingressSecurityRules: [{
protocol: "string",
source: "string",
description: "string",
icmpOptions: {
type: 0,
code: 0,
},
sourceType: "string",
stateless: false,
tcpOptions: {
max: 0,
min: 0,
sourcePortRange: {
max: 0,
min: 0,
},
},
udpOptions: {
max: 0,
min: 0,
sourcePortRange: {
max: 0,
min: 0,
},
},
}],
});
type: oci:Core:SecurityList
properties:
compartmentId: string
definedTags:
string: any
displayName: string
egressSecurityRules:
- description: string
destination: string
destinationType: string
icmpOptions:
code: 0
type: 0
protocol: string
stateless: false
tcpOptions:
max: 0
min: 0
sourcePortRange:
max: 0
min: 0
udpOptions:
max: 0
min: 0
sourcePortRange:
max: 0
min: 0
freeformTags:
string: any
ingressSecurityRules:
- description: string
icmpOptions:
code: 0
type: 0
protocol: string
source: string
sourceType: string
stateless: false
tcpOptions:
max: 0
min: 0
sourcePortRange:
max: 0
min: 0
udpOptions:
max: 0
min: 0
sourcePortRange:
max: 0
min: 0
vcnId: string
SecurityList Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The SecurityList resource accepts the following input properties:
- Compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- Vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Dictionary<string, object>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- Display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Egress
Security List<SecurityRules List Egress Security Rule> - (Updatable) Rules for allowing egress IP packets.
- Dictionary<string, object>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- Ingress
Security List<SecurityRules List Ingress Security Rule> - (Updatable) Rules for allowing ingress IP packets.
- Compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- Vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- map[string]interface{}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- Display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Egress
Security []SecurityRules List Egress Security Rule Args - (Updatable) Rules for allowing egress IP packets.
- map[string]interface{}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- Ingress
Security []SecurityRules List Ingress Security Rule Args - (Updatable) Rules for allowing ingress IP packets.
- compartment
Id String - (Updatable) The OCID of the compartment to contain the security list.
- vcn
Id String The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Map<String,Object>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name String - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security List<SecurityRules List Egress Security Rule> - (Updatable) Rules for allowing egress IP packets.
- Map<String,Object>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security List<SecurityRules List Ingress Security Rule> - (Updatable) Rules for allowing ingress IP packets.
- compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- {[key: string]: any}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security SecurityRules List Egress Security Rule[] - (Updatable) Rules for allowing egress IP packets.
- {[key: string]: any}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security SecurityRules List Ingress Security Rule[] - (Updatable) Rules for allowing ingress IP packets.
- compartment_
id str - (Updatable) The OCID of the compartment to contain the security list.
- vcn_
id str The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Mapping[str, Any]
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display_
name str - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress_
security_ Sequence[core.rules Security List Egress Security Rule Args] - (Updatable) Rules for allowing egress IP packets.
- Mapping[str, Any]
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress_
security_ Sequence[core.rules Security List Ingress Security Rule Args] - (Updatable) Rules for allowing ingress IP packets.
- compartment
Id String - (Updatable) The OCID of the compartment to contain the security list.
- vcn
Id String The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Map<Any>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name String - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security List<Property Map>Rules - (Updatable) Rules for allowing egress IP packets.
- Map<Any>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security List<Property Map>Rules - (Updatable) Rules for allowing ingress IP packets.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecurityList resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- State string
- The security list's current state.
- Time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Id string
- The provider-assigned unique ID for this managed resource.
- State string
- The security list's current state.
- Time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- id String
- The provider-assigned unique ID for this managed resource.
- state String
- The security list's current state.
- time
Created String - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- id string
- The provider-assigned unique ID for this managed resource.
- state string
- The security list's current state.
- time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- id str
- The provider-assigned unique ID for this managed resource.
- state str
- The security list's current state.
- time_
created str - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- id String
- The provider-assigned unique ID for this managed resource.
- state String
- The security list's current state.
- time
Created String - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
Look up Existing SecurityList Resource
Get an existing SecurityList resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecurityListState, opts?: CustomResourceOptions): SecurityList
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
compartment_id: Optional[str] = None,
defined_tags: Optional[Mapping[str, Any]] = None,
display_name: Optional[str] = None,
egress_security_rules: Optional[Sequence[_core.SecurityListEgressSecurityRuleArgs]] = None,
freeform_tags: Optional[Mapping[str, Any]] = None,
ingress_security_rules: Optional[Sequence[_core.SecurityListIngressSecurityRuleArgs]] = None,
state: Optional[str] = None,
time_created: Optional[str] = None,
vcn_id: Optional[str] = None) -> SecurityList
func GetSecurityList(ctx *Context, name string, id IDInput, state *SecurityListState, opts ...ResourceOption) (*SecurityList, error)
public static SecurityList Get(string name, Input<string> id, SecurityListState? state, CustomResourceOptions? opts = null)
public static SecurityList get(String name, Output<String> id, SecurityListState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- Dictionary<string, object>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- Display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Egress
Security List<SecurityRules List Egress Security Rule> - (Updatable) Rules for allowing egress IP packets.
- Dictionary<string, object>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- Ingress
Security List<SecurityRules List Ingress Security Rule> - (Updatable) Rules for allowing ingress IP packets.
- State string
- The security list's current state.
- Time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- map[string]interface{}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- Display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Egress
Security []SecurityRules List Egress Security Rule Args - (Updatable) Rules for allowing egress IP packets.
- map[string]interface{}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- Ingress
Security []SecurityRules List Ingress Security Rule Args - (Updatable) Rules for allowing ingress IP packets.
- State string
- The security list's current state.
- Time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- compartment
Id String - (Updatable) The OCID of the compartment to contain the security list.
- Map<String,Object>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name String - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security List<SecurityRules List Egress Security Rule> - (Updatable) Rules for allowing egress IP packets.
- Map<String,Object>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security List<SecurityRules List Ingress Security Rule> - (Updatable) Rules for allowing ingress IP packets.
- state String
- The security list's current state.
- time
Created String - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vcn
Id String The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- compartment
Id string - (Updatable) The OCID of the compartment to contain the security list.
- {[key: string]: any}
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name string - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security SecurityRules List Egress Security Rule[] - (Updatable) Rules for allowing egress IP packets.
- {[key: string]: any}
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security SecurityRules List Ingress Security Rule[] - (Updatable) Rules for allowing ingress IP packets.
- state string
- The security list's current state.
- time
Created string - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vcn
Id string The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- compartment_
id str - (Updatable) The OCID of the compartment to contain the security list.
- Mapping[str, Any]
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display_
name str - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress_
security_ Sequence[core.rules Security List Egress Security Rule Args] - (Updatable) Rules for allowing egress IP packets.
- Mapping[str, Any]
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress_
security_ Sequence[core.rules Security List Ingress Security Rule Args] - (Updatable) Rules for allowing ingress IP packets.
- state str
- The security list's current state.
- time_
created str - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vcn_
id str The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- compartment
Id String - (Updatable) The OCID of the compartment to contain the security list.
- Map<Any>
- (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"Operations.CostCenter": "42"}
- display
Name String - (Updatable) A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- egress
Security List<Property Map>Rules - (Updatable) Rules for allowing egress IP packets.
- Map<Any>
- (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example:
{"Department": "Finance"}
- ingress
Security List<Property Map>Rules - (Updatable) Rules for allowing ingress IP packets.
- state String
- The security list's current state.
- time
Created String - The date and time the security list was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vcn
Id String The OCID of the VCN the security list belongs to.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
Supporting Types
SecurityListEgressSecurityRule, SecurityListEgressSecurityRuleArgs
- Destination string
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- Protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Description string
- (Updatable) An optional description of your choice for the rule.
- Destination
Type string (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- Icmp
Options SecurityList Egress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options SecurityList Egress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Udp
Options SecurityList Egress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Destination string
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- Protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Description string
- (Updatable) An optional description of your choice for the rule.
- Destination
Type string (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- Icmp
Options SecurityList Egress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options SecurityList Egress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Udp
Options SecurityList Egress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination String
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- protocol String
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - description String
- (Updatable) An optional description of your choice for the rule.
- destination
Type String (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- icmp
Options SecurityList Egress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options SecurityList Egress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options SecurityList Egress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination string
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - description string
- (Updatable) An optional description of your choice for the rule.
- destination
Type string (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- icmp
Options SecurityList Egress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- stateless boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options SecurityList Egress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options SecurityList Egress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination str
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- protocol str
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - description str
- (Updatable) An optional description of your choice for the rule.
- destination_
type str (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- icmp_
options core.Security List Egress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_
options core.Security List Egress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp_
options core.Security List Egress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- destination String
(Updatable) Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
Note that IPv6 addressing is currently supported only in certain regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic destined for a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- protocol String
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - description String
- (Updatable) An optional description of your choice for the rule.
- destination
Type String (Updatable) Type of destination for the rule. The default is
CIDR_BLOCK
.Allowed values:
CIDR_BLOCK
: If the rule'sdestination
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'sdestination
is thecidrBlock
value for a Service (the rule is for traffic destined for a particularService
through a service gateway).
- icmp
Options Property Map (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options Property Map - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options Property Map - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
SecurityListEgressSecurityRuleIcmpOptions, SecurityListEgressSecurityRuleIcmpOptionsArgs
SecurityListEgressSecurityRuleTcpOptions, SecurityListEgressSecurityRuleTcpOptionsArgs
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Egress Security Rule Tcp Options Source Port Range - (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Egress Security Rule Tcp Options Source Port Range - (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Egress Security Rule Tcp Options Source Port Range - (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Egress Security Rule Tcp Options Source Port Range - (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_
port_ core.range Security List Egress Security Rule Tcp Options Source Port Range - (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port Property MapRange - (Updatable)
SecurityListEgressSecurityRuleTcpOptionsSourcePortRange, SecurityListEgressSecurityRuleTcpOptionsSourcePortRangeArgs
SecurityListEgressSecurityRuleUdpOptions, SecurityListEgressSecurityRuleUdpOptionsArgs
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Egress Security Rule Udp Options Source Port Range - (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Egress Security Rule Udp Options Source Port Range - (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Egress Security Rule Udp Options Source Port Range - (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Egress Security Rule Udp Options Source Port Range - (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_
port_ core.range Security List Egress Security Rule Udp Options Source Port Range - (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port Property MapRange - (Updatable)
SecurityListEgressSecurityRuleUdpOptionsSourcePortRange, SecurityListEgressSecurityRuleUdpOptionsSourcePortRangeArgs
SecurityListIngressSecurityRule, SecurityListIngressSecurityRuleArgs
- Protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Source string
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- Description string
- (Updatable) An optional description of your choice for the rule.
- Icmp
Options SecurityList Ingress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- Source
Type string - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options SecurityList Ingress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Udp
Options SecurityList Ingress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Source string
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- Description string
- (Updatable) An optional description of your choice for the rule.
- Icmp
Options SecurityList Ingress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- Source
Type string - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- Stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options SecurityList Ingress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Udp
Options SecurityList Ingress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol String
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source String
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- description String
- (Updatable) An optional description of your choice for the rule.
- icmp
Options SecurityList Ingress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- source
Type String - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options SecurityList Ingress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options SecurityList Ingress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol string
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source string
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- description string
- (Updatable) An optional description of your choice for the rule.
- icmp
Options SecurityList Ingress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- source
Type string - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- stateless boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options SecurityList Ingress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options SecurityList Ingress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol str
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source str
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- description str
- (Updatable) An optional description of your choice for the rule.
- icmp_
options core.Security List Ingress Security Rule Icmp Options (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- source_
type str - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- stateless bool
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_
options core.Security List Ingress Security Rule Tcp Options - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp_
options core.Security List Ingress Security Rule Udp Options - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- protocol String
- (Updatable) The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source String
(Updatable) Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
Allowed values:
- IP address range in CIDR notation. For example:
192.168.1.0/24
or2001:0db8:0123:45::/56
. IPv6 addressing is supported for all commercial and government regions. See IPv6 Addresses. - The
cidrBlock
value for a Service, if you're setting up a security list rule for traffic coming from a particularService
through a service gateway. For example:oci-phx-objectstorage
.
- IP address range in CIDR notation. For example:
- description String
- (Updatable) An optional description of your choice for the rule.
- icmp
Options Property Map (Updatable) Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
If you specify ICMP or ICMPv6 as the protocol but omit this object, then all ICMP types and codes are allowed. If you do provide this object, the type is required and the code is optional. To enable MTU negotiation for ingress internet traffic via IPv4, make sure to allow type 3 ("Destination Unreachable") code 4 ("Fragmentation Needed and Don't Fragment was Set"). If you need to specify multiple codes for a single type, create a separate security list rule for each.
- source
Type String - (Updatable) Type of source for the rule. The default is
CIDR_BLOCK
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).
- stateless Boolean
- (Updatable) A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if ingress traffic allows TCP destination port 80, there should be an egress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options Property Map - (Updatable) Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- udp
Options Property Map - (Updatable) Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
SecurityListIngressSecurityRuleIcmpOptions, SecurityListIngressSecurityRuleIcmpOptionsArgs
SecurityListIngressSecurityRuleTcpOptions, SecurityListIngressSecurityRuleTcpOptionsArgs
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Ingress Security Rule Tcp Options Source Port Range - (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Ingress Security Rule Tcp Options Source Port Range - (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Ingress Security Rule Tcp Options Source Port Range - (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Ingress Security Rule Tcp Options Source Port Range - (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_
port_ core.range Security List Ingress Security Rule Tcp Options Source Port Range - (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port Property MapRange - (Updatable)
SecurityListIngressSecurityRuleTcpOptionsSourcePortRange, SecurityListIngressSecurityRuleTcpOptionsSourcePortRangeArgs
SecurityListIngressSecurityRuleUdpOptions, SecurityListIngressSecurityRuleUdpOptionsArgs
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Ingress Security Rule Udp Options Source Port Range - (Updatable)
- Max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- Min int
- The minimum port number. Must not be greater than the maximum port number.
- Source
Port SecurityRange List Ingress Security Rule Udp Options Source Port Range - (Updatable)
- max Integer
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Integer
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Ingress Security Rule Udp Options Source Port Range - (Updatable)
- max number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port SecurityRange List Ingress Security Rule Udp Options Source Port Range - (Updatable)
- max int
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min int
- The minimum port number. Must not be greater than the maximum port number.
- source_
port_ core.range Security List Ingress Security Rule Udp Options Source Port Range - (Updatable)
- max Number
- The maximum port number. Must not be lower than the minimum port number. To specify a single port number, set both the min and max to the same value.
- min Number
- The minimum port number. Must not be greater than the maximum port number.
- source
Port Property MapRange - (Updatable)
SecurityListIngressSecurityRuleUdpOptionsSourcePortRange, SecurityListIngressSecurityRuleUdpOptionsSourcePortRangeArgs
Import
SecurityLists can be imported using the id
, e.g.
$ pulumi import oci:Core/securityList:SecurityList test_security_list "id"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.