Class DecryptionRule
Decryption Rule used in the firewall policy rules. A Decryption Rule is used to define which traffic should be decrypted by the firewall, and how it should do so.
Inherited Members
Namespace: Oci.NetworkfirewallService.Models
Assembly: OCI.DotNetSDK.Networkfirewall.dll
Syntax
public class DecryptionRule
Properties
Action
Declaration
[Required(ErrorMessage = "Action is required.")]
[JsonProperty(PropertyName = "action")]
[JsonConverter(typeof(ResponseEnumConverter))]
public DecryptionActionType? Action { get; set; }
Property Value
Type | Description |
---|---|
DecryptionActionType? | Action:
|
Remarks
Required
Condition
Declaration
[Required(ErrorMessage = "Condition is required.")]
[JsonProperty(PropertyName = "condition")]
public DecryptionRuleMatchCriteria Condition { get; set; }
Property Value
Type | Description |
---|---|
DecryptionRuleMatchCriteria |
Remarks
Required
DecryptionProfile
Declaration
[JsonProperty(PropertyName = "decryptionProfile")]
public string DecryptionProfile { get; set; }
Property Value
Type | Description |
---|---|
string | The name of the decryption profile to use. |
Name
Declaration
[Required(ErrorMessage = "Name is required.")]
[JsonProperty(PropertyName = "name")]
public string Name { get; set; }
Property Value
Type | Description |
---|---|
string | Name for the decryption rule, must be unique within the policy. |
Remarks
Required
ParentResourceId
Declaration
[Required(ErrorMessage = "ParentResourceId is required.")]
[JsonProperty(PropertyName = "parentResourceId")]
public string ParentResourceId { get; set; }
Property Value
Type | Description |
---|---|
string | OCID of the Network Firewall Policy this decryption rule belongs to. |
Remarks
Required
Position
Declaration
[JsonProperty(PropertyName = "position")]
public RulePosition Position { get; set; }
Property Value
Type | Description |
---|---|
RulePosition |
Secret
Declaration
[JsonProperty(PropertyName = "secret")]
public string Secret { get; set; }
Property Value
Type | Description |
---|---|
string | The name of a mapped secret. Its |