FirewallPolicyRuleMatcherArgs

data class FirewallPolicyRuleMatcherArgs(val destAddressGroups: Output<List<String>>? = null, val destFqdns: Output<List<String>>? = null, val destIpRanges: Output<List<String>>? = null, val destRegionCodes: Output<List<String>>? = null, val destThreatIntelligences: Output<List<String>>? = null, val layer4Configs: Output<List<FirewallPolicyRuleMatcherLayer4ConfigArgs>>? = null, val srcAddressGroups: Output<List<String>>? = null, val srcFqdns: Output<List<String>>? = null, val srcIpRanges: Output<List<String>>? = null, val srcRegionCodes: Output<List<String>>? = null, val srcSecureTags: Output<List<FirewallPolicyRuleSecureTagArgs>>? = null, val srcThreatIntelligences: Output<List<String>>? = null) : ConvertibleToJava<FirewallPolicyRuleMatcherArgs>

Represents a match condition that incoming traffic is evaluated against. Exactly one field must be specified.

Constructors

Link copied to clipboard
fun FirewallPolicyRuleMatcherArgs(destAddressGroups: Output<List<String>>? = null, destFqdns: Output<List<String>>? = null, destIpRanges: Output<List<String>>? = null, destRegionCodes: Output<List<String>>? = null, destThreatIntelligences: Output<List<String>>? = null, layer4Configs: Output<List<FirewallPolicyRuleMatcherLayer4ConfigArgs>>? = null, srcAddressGroups: Output<List<String>>? = null, srcFqdns: Output<List<String>>? = null, srcIpRanges: Output<List<String>>? = null, srcRegionCodes: Output<List<String>>? = null, srcSecureTags: Output<List<FirewallPolicyRuleSecureTagArgs>>? = null, srcThreatIntelligences: Output<List<String>>? = null)

Functions

Link copied to clipboard
open override fun toJava(): FirewallPolicyRuleMatcherArgs

Properties

Link copied to clipboard
val destAddressGroups: Output<List<String>>? = null

Address groups which should be matched against the traffic destination. Maximum number of destination address groups is 10.

Link copied to clipboard
val destFqdns: Output<List<String>>? = null

Fully Qualified Domain Name (FQDN) which should be matched against traffic destination. Maximum number of destination fqdn allowed is 100.

Link copied to clipboard
val destIpRanges: Output<List<String>>? = null

CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.

Link copied to clipboard
val destRegionCodes: Output<List<String>>? = null

Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.

Link copied to clipboard
val destThreatIntelligences: Output<List<String>>? = null

Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic destination.

Link copied to clipboard

Pairs of IP protocols and ports that the rule should match.

Link copied to clipboard
val srcAddressGroups: Output<List<String>>? = null

Address groups which should be matched against the traffic source. Maximum number of source address groups is 10.

Link copied to clipboard
val srcFqdns: Output<List<String>>? = null

Fully Qualified Domain Name (FQDN) which should be matched against traffic source. Maximum number of source fqdn allowed is 100.

Link copied to clipboard
val srcIpRanges: Output<List<String>>? = null

CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.

Link copied to clipboard
val srcRegionCodes: Output<List<String>>? = null

Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.

Link copied to clipboard

List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.

Link copied to clipboard
val srcThreatIntelligences: Output<List<String>>? = null

Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic source.