oracle.oci.oci_network_firewall_policy – Manage a NetworkFirewallPolicy resource in Oracle Cloud Infrastructure¶
Note
This plugin is part of the oracle.oci collection (version 5.3.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install oracle.oci
.
To use it in a playbook, specify: oracle.oci.oci_network_firewall_policy
.
New in version 2.9.0: of oracle.oci
Synopsis¶
This module allows the user to create, update and delete a NetworkFirewallPolicy resource in Oracle Cloud Infrastructure
For state=present, creates a new Network Firewall Policy.
This resource has the following action operations in the oracle.oci.oci_network_firewall_policy_actions module: change_compartment.
Requirements¶
The below requirements are needed on the host that executes this module.
python >= 3.6
Python SDK for Oracle Cloud Infrastructure https://oracle-cloud-infrastructure-python-sdk.readthedocs.io
Parameters¶
Parameter | Choices/Defaults | Comments | ||
---|---|---|---|---|
api_user
string
|
The OCID of the user, on whose behalf, OCI APIs are invoked. If not set, then the value of the OCI_USER_ID environment variable, if any, is used. This option is required if the user is not specified through a configuration file (See
config_file_location ). To get the user's OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. |
|||
api_user_fingerprint
string
|
Fingerprint for the key pair being used. If not set, then the value of the OCI_USER_FINGERPRINT environment variable, if any, is used. This option is required if the key fingerprint is not specified through a configuration file (See
config_file_location ). To get the key pair's fingerprint value please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. |
|||
api_user_key_file
string
|
Full path and filename of the private key (in PEM format). If not set, then the value of the OCI_USER_KEY_FILE variable, if any, is used. This option is required if the private key is not specified through a configuration file (See
config_file_location ). If the key is encrypted with a pass-phrase, the api_user_key_pass_phrase option must also be provided. |
|||
api_user_key_pass_phrase
string
|
Passphrase used by the key referenced in
api_user_key_file , if it is encrypted. If not set, then the value of the OCI_USER_KEY_PASS_PHRASE variable, if any, is used. This option is required if the key passphrase is not specified through a configuration file (See config_file_location ). |
|||
application_lists
dictionary
|
Map defining application lists of the policy. The value of an entry is a list of "applications", each consisting of a protocol identifier (such as TCP, UDP, or ICMP) and protocol-specific parameters (such as a port range). The associated key is the identifier by which the application list is referenced.
This parameter is updatable.
|
|||
auth_purpose
string
|
|
The auth purpose which can be used in conjunction with 'auth_type=instance_principal'. The default auth_purpose for instance_principal is None.
|
||
auth_type
string
|
|
The type of authentication to use for making API requests. By default
auth_type="api_key" based authentication is performed and the API key (see api_user_key_file) in your config file will be used. If this 'auth_type' module option is not specified, the value of the OCI_ANSIBLE_AUTH_TYPE, if any, is used. Use auth_type="instance_principal" to use instance principal based authentication when running ansible playbooks within an OCI compute instance. |
||
cert_bundle
string
|
The full path to a CA certificate bundle to be used for SSL verification. This will override the default CA certificate bundle. If not set, then the value of the OCI_ANSIBLE_CERT_BUNDLE variable, if any, is used.
|
|||
compartment_id
string
|
The OCID of the compartment containing the NetworkFirewall Policy.
Required for create using state=present.
Required for update when environment variable
OCI_USE_NAME_AS_IDENTIFIER is set.Required for delete when environment variable
OCI_USE_NAME_AS_IDENTIFIER is set. |
|||
config_file_location
string
|
Path to configuration file. If not set then the value of the OCI_CONFIG_FILE environment variable, if any, is used. Otherwise, defaults to ~/.oci/config.
|
|||
config_profile_name
string
|
The profile to load from the config file referenced by
config_file_location . If not set, then the value of the OCI_CONFIG_PROFILE environment variable, if any, is used. Otherwise, defaults to the "DEFAULT" profile in config_file_location . |
|||
decryption_profiles
dictionary
|
Map defining decryption profiles of the policy. The value of an entry is a decryption profile. The associated key is the identifier by which the decryption profile is referenced.
This parameter is updatable.
|
|||
are_certificate_extensions_restricted
boolean
|
|
Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
Required when type is 'SSL_FORWARD_PROXY'
|
||
is_auto_include_alt_name
boolean
|
|
Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
Required when type is 'SSL_FORWARD_PROXY'
|
||
is_expired_certificate_blocked
boolean
|
|
Whether to block sessions if server's certificate is expired.
Required when type is 'SSL_FORWARD_PROXY'
|
||
is_out_of_capacity_blocked
boolean
/ required
|
|
Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
|
||
is_revocation_status_timeout_blocked
boolean
|
|
Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
Required when type is 'SSL_FORWARD_PROXY'
|
||
is_unknown_revocation_status_blocked
boolean
|
|
Whether to block sessions if the revocation status check for server's certificate results in "unknown".
Required when type is 'SSL_FORWARD_PROXY'
|
||
is_unsupported_cipher_blocked
boolean
/ required
|
|
Whether to block sessions if SSL cipher suite is not supported.
|
||
is_unsupported_version_blocked
boolean
/ required
|
|
Whether to block sessions if SSL version is not supported.
|
||
is_untrusted_issuer_blocked
boolean
|
|
Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
Required when type is 'SSL_FORWARD_PROXY'
|
||
type
string
/ required
|
|
Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
|
||
decryption_rules
list
/ elements=dictionary
|
List of Decryption Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
This parameter is updatable.
|
|||
action
string
/ required
|
|
Action:
* NO_DECRYPT - Matching traffic is not decrypted. * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
|
||
condition
dictionary
/ required
|
||||
destinations
list
/ elements=string
|
An array of IP address list names to be evaluated against the traffic destination address.
|
|||
sources
list
/ elements=string
|
An array of IP address list names to be evaluated against the traffic source address.
|
|||
decryption_profile
string
|
The name of the decryption profile to use.
|
|||
name
string
/ required
|
Name for the decryption rule, must be unique within the policy.
|
|||
secret
string
|
The name of a mapped secret. Its `type` must match that of the specified decryption profile.
|
|||
defined_tags
dictionary
|
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace": {"bar-key": "value"}}`
This parameter is updatable.
|
|||
display_name
string
|
A user-friendly optional name for the firewall policy. Avoid entering confidential information.
Required for create, update, delete when environment variable
OCI_USE_NAME_AS_IDENTIFIER is set.This parameter is updatable when
OCI_USE_NAME_AS_IDENTIFIER is not set.aliases: name |
|||
force_create
boolean
|
|
Whether to attempt non-idempotent creation of a resource. By default, create resource is an idempotent operation, and doesn't create the resource if it already exists. Setting this option to true, forcefully creates a copy of the resource, even if it already exists.This option is mutually exclusive with key_by.
|
||
freeform_tags
dictionary
|
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`
This parameter is updatable.
|
|||
ip_address_lists
dictionary
|
Map defining IP address lists of the policy. The value of an entry is a list of IP addresses or prefixes in CIDR notation. The associated key is the identifier by which the IP address list is referenced.
This parameter is updatable.
|
|||
key_by
list
/ elements=string
|
The list of attributes of this resource which should be used to uniquely identify an instance of the resource. By default, all the attributes of a resource are used to uniquely identify a resource.
|
|||
mapped_secrets
dictionary
|
Map defining secrets of the policy. The value of an entry is a "mapped secret" consisting of a purpose and source. The associated key is the identifier by which the mapped secret is referenced.
This parameter is updatable.
|
|||
source
string
/ required
|
|
Source of the secrets, where the secrets are stored.
|
||
type
string
/ required
|
|
Type of the secrets mapped based on the policy.
* `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic. * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
|
||
vault_secret_id
string
/ required
|
OCID for the Vault Secret to be used.
|
|||
version_number
integer
/ required
|
Version number of the secret to be used.
|
|||
network_firewall_policy_id
string
|
Unique Network Firewall Policy identifier
Required for update using state=present when environment variable
OCI_USE_NAME_AS_IDENTIFIER is not set.Required for delete using state=absent when environment variable
OCI_USE_NAME_AS_IDENTIFIER is not set.aliases: id |
|||
realm_specific_endpoint_template_enabled
boolean
|
|
Enable/Disable realm specific endpoint template for service client. By Default, realm specific endpoint template is disabled. If not set, then the value of the OCI_REALM_SPECIFIC_SERVICE_ENDPOINT_TEMPLATE_ENABLED variable, if any, is used.
|
||
region
string
|
The Oracle Cloud Infrastructure region to use for all OCI API requests. If not set, then the value of the OCI_REGION variable, if any, is used. This option is required if the region is not specified through a configuration file (See
config_file_location ). Please refer to https://docs.us-phoenix-1.oraclecloud.com/Content/General/Concepts/regions.htm for more information on OCI regions. |
|||
security_rules
list
/ elements=dictionary
|
List of Security Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
This parameter is updatable.
|
|||
action
string
/ required
|
|
Types of Action on the Traffic flow.
* ALLOW - Allows the traffic. * DROP - Silently drops the traffic, e.g. without sending a TCP reset. * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable. * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
|
||
condition
dictionary
/ required
|
||||
applications
list
/ elements=string
|
An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
|
|||
destinations
list
/ elements=string
|
An array of IP address list names to be evaluated against the traffic destination address.
|
|||
sources
list
/ elements=string
|
An array of IP address list names to be evaluated against the traffic source address.
|
|||
urls
list
/ elements=string
|
An array of URL pattern list names to be evaluated against the HTTP(S) request target.
|
|||
inspection
string
|
|
Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
* INTRUSION_DETECTION - Intrusion Detection. * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
|
||
name
string
/ required
|
Name for the Security rule, must be unique within the policy.
|
|||
state
string
|
|
The state of the NetworkFirewallPolicy.
Use state=present to create or update a NetworkFirewallPolicy.
Use state=absent to delete a NetworkFirewallPolicy.
|
||
tenancy
string
|
OCID of your tenancy. If not set, then the value of the OCI_TENANCY variable, if any, is used. This option is required if the tenancy OCID is not specified through a configuration file (See
config_file_location ). To get the tenancy OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm |
|||
url_lists
dictionary
|
Map defining URL pattern lists of the policy. The value of an entry is a list of URL patterns. The associated key is the identifier by which the URL pattern list is referenced.
This parameter is updatable.
|
|||
wait
boolean
|
|
Whether to wait for create or delete operation to complete.
|
||
wait_timeout
integer
|
Time, in seconds, to wait when wait=yes. Defaults to 1200 for most of the services but some services might have a longer wait timeout.
|
Notes¶
Note
For OCI python sdk configuration, please refer to https://oracle-cloud-infrastructure-python-sdk.readthedocs.io/en/latest/configuration.html
Examples¶
- name: Create network_firewall_policy
oci_network_firewall_policy:
# required
compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
# optional
display_name: display_name_example
mapped_secrets:
# required
source: OCI_VAULT
type: SSL_INBOUND_INSPECTION
vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
version_number: 56
application_lists: null
url_lists: null
ip_address_lists: null
security_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
applications: [ "applications_example" ]
urls: [ "urls_example" ]
action: ALLOW
- # optional
inspection: INTRUSION_DETECTION
decryption_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
action: NO_DECRYPT
- # optional
decryption_profile: decryption_profile_example
secret: secret_example
decryption_profiles:
# required
type: SSL_INBOUND_INSPECTION
is_unsupported_version_blocked: true
is_unsupported_cipher_blocked: true
is_out_of_capacity_blocked: true
freeform_tags: {'Department': 'Finance'}
defined_tags: {'Operations': {'CostCenter': 'US'}}
- name: Update network_firewall_policy
oci_network_firewall_policy:
# required
network_firewall_policy_id: "ocid1.networkfirewallpolicy.oc1..xxxxxxEXAMPLExxxxxx"
# optional
display_name: display_name_example
mapped_secrets:
# required
source: OCI_VAULT
type: SSL_INBOUND_INSPECTION
vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
version_number: 56
application_lists: null
url_lists: null
ip_address_lists: null
security_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
applications: [ "applications_example" ]
urls: [ "urls_example" ]
action: ALLOW
- # optional
inspection: INTRUSION_DETECTION
decryption_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
action: NO_DECRYPT
- # optional
decryption_profile: decryption_profile_example
secret: secret_example
decryption_profiles:
# required
type: SSL_INBOUND_INSPECTION
is_unsupported_version_blocked: true
is_unsupported_cipher_blocked: true
is_out_of_capacity_blocked: true
freeform_tags: {'Department': 'Finance'}
defined_tags: {'Operations': {'CostCenter': 'US'}}
- name: Update network_firewall_policy using name (when environment variable OCI_USE_NAME_AS_IDENTIFIER is set)
oci_network_firewall_policy:
# required
compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
display_name: display_name_example
# optional
mapped_secrets:
# required
source: OCI_VAULT
type: SSL_INBOUND_INSPECTION
vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
version_number: 56
application_lists: null
url_lists: null
ip_address_lists: null
security_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
applications: [ "applications_example" ]
urls: [ "urls_example" ]
action: ALLOW
- # optional
inspection: INTRUSION_DETECTION
decryption_rules:
- # required
name: name_example
condition:
# optional
sources: [ "sources_example" ]
destinations: [ "destinations_example" ]
action: NO_DECRYPT
- # optional
decryption_profile: decryption_profile_example
secret: secret_example
decryption_profiles:
# required
type: SSL_INBOUND_INSPECTION
is_unsupported_version_blocked: true
is_unsupported_cipher_blocked: true
is_out_of_capacity_blocked: true
freeform_tags: {'Department': 'Finance'}
defined_tags: {'Operations': {'CostCenter': 'US'}}
- name: Delete network_firewall_policy
oci_network_firewall_policy:
# required
network_firewall_policy_id: "ocid1.networkfirewallpolicy.oc1..xxxxxxEXAMPLExxxxxx"
state: absent
- name: Delete network_firewall_policy using name (when environment variable OCI_USE_NAME_AS_IDENTIFIER is set)
oci_network_firewall_policy:
# required
compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
display_name: display_name_example
state: absent
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description | |||
---|---|---|---|---|---|
network_firewall_policy
complex
|
on success |
Details of the NetworkFirewallPolicy resource acted upon by the current operation
Sample:
{'application_lists': {}, 'compartment_id': 'ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx', 'decryption_profiles': {'are_certificate_extensions_restricted': True, 'is_auto_include_alt_name': True, 'is_expired_certificate_blocked': True, 'is_out_of_capacity_blocked': True, 'is_revocation_status_timeout_blocked': True, 'is_unknown_revocation_status_blocked': True, 'is_unsupported_cipher_blocked': True, 'is_unsupported_version_blocked': True, 'is_untrusted_issuer_blocked': True, 'type': 'SSL_INBOUND_INSPECTION'}, 'decryption_rules': [{'action': 'NO_DECRYPT', 'condition': {'destinations': [], 'sources': []}, 'decryption_profile': 'decryption_profile_example', 'name': 'name_example', 'secret': 'secret_example'}], 'defined_tags': {'Operations': {'CostCenter': 'US'}}, 'display_name': 'display_name_example', 'freeform_tags': {'Department': 'Finance'}, 'id': 'ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx', 'ip_address_lists': {}, 'is_firewall_attached': True, 'lifecycle_details': 'lifecycle_details_example', 'lifecycle_state': 'CREATING', 'mapped_secrets': {'source': 'OCI_VAULT', 'type': 'SSL_INBOUND_INSPECTION', 'vault_secret_id': 'ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx', 'version_number': 56}, 'security_rules': [{'action': 'ALLOW', 'condition': {'applications': [], 'destinations': [], 'sources': [], 'urls': []}, 'inspection': 'INTRUSION_DETECTION', 'name': 'name_example'}], 'system_tags': {}, 'time_created': '2013-10-20T19:20:30+01:00', 'time_updated': '2013-10-20T19:20:30+01:00', 'url_lists': {}}
|
|||
application_lists
dictionary
|
on success |
Map defining application lists of the policy. The value of an entry is a list of "applications", each consisting of a protocol identifier (such as TCP, UDP, or ICMP) and protocol- specific parameters (such as a port range). The associated key is the identifier by which the application list is referenced.
|
|||
compartment_id
string
|
on success |
The OCID of the compartment containing the NetworkFirewall Policy.
Sample:
ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx
|
|||
decryption_profiles
complex
|
on success |
Map defining decryption profiles of the policy. The value of an entry is a decryption profile. The associated key is the identifier by which the decryption profile is referenced.
|
|||
are_certificate_extensions_restricted
boolean
|
on success |
Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
Sample:
True
|
|||
is_auto_include_alt_name
boolean
|
on success |
Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
Sample:
True
|
|||
is_expired_certificate_blocked
boolean
|
on success |
Whether to block sessions if server's certificate is expired.
Sample:
True
|
|||
is_out_of_capacity_blocked
boolean
|
on success |
Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
Sample:
True
|
|||
is_revocation_status_timeout_blocked
boolean
|
on success |
Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
Sample:
True
|
|||
is_unknown_revocation_status_blocked
boolean
|
on success |
Whether to block sessions if the revocation status check for server's certificate results in "unknown".
Sample:
True
|
|||
is_unsupported_cipher_blocked
boolean
|
on success |
Whether to block sessions if SSL cipher suite is not supported.
Sample:
True
|
|||
is_unsupported_version_blocked
boolean
|
on success |
Whether to block sessions if SSL version is not supported.
Sample:
True
|
|||
is_untrusted_issuer_blocked
boolean
|
on success |
Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
Sample:
True
|
|||
type
string
|
on success |
Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
Sample:
SSL_INBOUND_INSPECTION
|
|||
decryption_rules
complex
|
on success |
List of Decryption Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
|
|||
action
string
|
on success |
Action:
* NO_DECRYPT - Matching traffic is not decrypted. * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
Sample:
NO_DECRYPT
|
|||
condition
complex
|
on success |
|
|||
destinations
list
/ elements=string
|
on success |
An array of IP address list names to be evaluated against the traffic destination address.
|
|||
sources
list
/ elements=string
|
on success |
An array of IP address list names to be evaluated against the traffic source address.
|
|||
decryption_profile
string
|
on success |
The name of the decryption profile to use.
Sample:
decryption_profile_example
|
|||
name
string
|
on success |
Name for the decryption rule, must be unique within the policy.
Sample:
name_example
|
|||
secret
string
|
on success |
The name of a mapped secret. Its `type` must match that of the specified decryption profile.
Sample:
secret_example
|
|||
defined_tags
dictionary
|
on success |
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace": {"bar-key": "value"}}`
Sample:
{'Operations': {'CostCenter': 'US'}}
|
|||
display_name
string
|
on success |
A user-friendly optional name for the firewall policy. Avoid entering confidential information.
Sample:
display_name_example
|
|||
freeform_tags
dictionary
|
on success |
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`
Sample:
{'Department': 'Finance'}
|
|||
id
string
|
on success |
The OCID of the resource - Network Firewall Policy.
Sample:
ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx
|
|||
ip_address_lists
dictionary
|
on success |
Map defining IP address lists of the policy. The value of an entry is a list of IP addresses or prefixes in CIDR notation. The associated key is the identifier by which the IP address list is referenced.
|
|||
is_firewall_attached
boolean
|
on success |
To determine if any Network Firewall is associated with this Network Firewall Policy.
Sample:
True
|
|||
lifecycle_details
string
|
on success |
A message describing the current state in more detail. For example, can be used to provide actionable information for a resource in Failed state.
Sample:
lifecycle_details_example
|
|||
lifecycle_state
string
|
on success |
The current state of the Network Firewall Policy.
Sample:
CREATING
|
|||
mapped_secrets
complex
|
on success |
Map defining secrets of the policy. The value of an entry is a "mapped secret" consisting of a purpose and source. The associated key is the identifier by which the mapped secret is referenced.
|
|||
source
string
|
on success |
Source of the secrets, where the secrets are stored.
Sample:
OCI_VAULT
|
|||
type
string
|
on success |
Type of the secrets mapped based on the policy.
* `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic. * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
Sample:
SSL_INBOUND_INSPECTION
|
|||
vault_secret_id
string
|
on success |
OCID for the Vault Secret to be used.
Sample:
ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx
|
|||
version_number
integer
|
on success |
Version number of the secret to be used.
Sample:
56
|
|||
security_rules
complex
|
on success |
List of Security Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
|
|||
action
string
|
on success |
Types of Action on the Traffic flow.
* ALLOW - Allows the traffic. * DROP - Silently drops the traffic, e.g. without sending a TCP reset. * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable. * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
Sample:
ALLOW
|
|||
condition
complex
|
on success |
|
|||
applications
list
/ elements=string
|
on success |
An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
|
|||
destinations
list
/ elements=string
|
on success |
An array of IP address list names to be evaluated against the traffic destination address.
|
|||
sources
list
/ elements=string
|
on success |
An array of IP address list names to be evaluated against the traffic source address.
|
|||
urls
list
/ elements=string
|
on success |
An array of URL pattern list names to be evaluated against the HTTP(S) request target.
|
|||
inspection
string
|
on success |
Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
* INTRUSION_DETECTION - Intrusion Detection. * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
Sample:
INTRUSION_DETECTION
|
|||
name
string
|
on success |
Name for the Security rule, must be unique within the policy.
Sample:
name_example
|
|||
system_tags
dictionary
|
on success |
Usage of system tag keys. These predefined keys are scoped to namespaces. Example: `{"orcl-cloud": {"free-tier-retained": "true"}}`
|
|||
time_created
string
|
on success |
The time instant at which the Network Firewall Policy was created in the format defined by RFC3339. Example: `2016-08-25T21:10:29.600Z`
Sample:
2013-10-20T19:20:30+01:00
|
|||
time_updated
string
|
on success |
The time instant at which the Network Firewall Policy was updated in the format defined by RFC3339. Example: `2016-08-25T21:10:29.600Z`
Sample:
2013-10-20T19:20:30+01:00
|
|||
url_lists
dictionary
|
on success |
Map defining URL pattern lists of the policy. The value of an entry is a list of URL patterns. The associated key is the identifier by which the URL pattern list is referenced.
|
Authors¶
Oracle (@oracle)