oracle.oci.oci_network_firewall_policy – Manage a NetworkFirewallPolicy resource in Oracle Cloud Infrastructure

Note

This plugin is part of the oracle.oci collection (version 4.13.0).

You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.

To install it, use: ansible-galaxy collection install oracle.oci.

To use it in a playbook, specify: oracle.oci.oci_network_firewall_policy.

New in version 2.9.0: of oracle.oci

Synopsis

  • This module allows the user to create, update and delete a NetworkFirewallPolicy resource in Oracle Cloud Infrastructure

  • For state=present, creates a new Network Firewall Policy.

  • This resource has the following action operations in the oracle.oci.oci_network_firewall_policy_actions module: change_compartment.

Requirements

The below requirements are needed on the host that executes this module.

Parameters

Parameter Choices/Defaults Comments
api_user
string
The OCID of the user, on whose behalf, OCI APIs are invoked. If not set, then the value of the OCI_USER_ID environment variable, if any, is used. This option is required if the user is not specified through a configuration file (See config_file_location). To get the user's OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm.
api_user_fingerprint
string
Fingerprint for the key pair being used. If not set, then the value of the OCI_USER_FINGERPRINT environment variable, if any, is used. This option is required if the key fingerprint is not specified through a configuration file (See config_file_location). To get the key pair's fingerprint value please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm.
api_user_key_file
string
Full path and filename of the private key (in PEM format). If not set, then the value of the OCI_USER_KEY_FILE variable, if any, is used. This option is required if the private key is not specified through a configuration file (See config_file_location). If the key is encrypted with a pass-phrase, the api_user_key_pass_phrase option must also be provided.
api_user_key_pass_phrase
string
Passphrase used by the key referenced in api_user_key_file, if it is encrypted. If not set, then the value of the OCI_USER_KEY_PASS_PHRASE variable, if any, is used. This option is required if the key passphrase is not specified through a configuration file (See config_file_location).
application_lists
dictionary
Map defining application lists of the policy. The value of an entry is a list of "applications", each consisting of a protocol identifier (such as TCP, UDP, or ICMP) and protocol-specific parameters (such as a port range). The associated key is the identifier by which the application list is referenced.
This parameter is updatable.
auth_purpose
string
    Choices:
  • service_principal
The auth purpose which can be used in conjunction with 'auth_type=instance_principal'. The default auth_purpose for instance_principal is None.
auth_type
string
    Choices:
  • api_key ←
  • instance_principal
  • instance_obo_user
  • resource_principal
The type of authentication to use for making API requests. By default auth_type="api_key" based authentication is performed and the API key (see api_user_key_file) in your config file will be used. If this 'auth_type' module option is not specified, the value of the OCI_ANSIBLE_AUTH_TYPE, if any, is used. Use auth_type="instance_principal" to use instance principal based authentication when running ansible playbooks within an OCI compute instance.
cert_bundle
string
The full path to a CA certificate bundle to be used for SSL verification. This will override the default CA certificate bundle. If not set, then the value of the OCI_ANSIBLE_CERT_BUNDLE variable, if any, is used.
compartment_id
string
The OCID of the compartment containing the NetworkFirewall Policy.
Required for create using state=present.
Required for update when environment variable OCI_USE_NAME_AS_IDENTIFIER is set.
Required for delete when environment variable OCI_USE_NAME_AS_IDENTIFIER is set.
config_file_location
string
Path to configuration file. If not set then the value of the OCI_CONFIG_FILE environment variable, if any, is used. Otherwise, defaults to ~/.oci/config.
config_profile_name
string
The profile to load from the config file referenced by config_file_location. If not set, then the value of the OCI_CONFIG_PROFILE environment variable, if any, is used. Otherwise, defaults to the "DEFAULT" profile in config_file_location.
decryption_profiles
dictionary
Map defining decryption profiles of the policy. The value of an entry is a decryption profile. The associated key is the identifier by which the decryption profile is referenced.
This parameter is updatable.
are_certificate_extensions_restricted
boolean
    Choices:
  • no
  • yes
Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
Required when type is 'SSL_FORWARD_PROXY'
is_auto_include_alt_name
boolean
    Choices:
  • no
  • yes
Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
Required when type is 'SSL_FORWARD_PROXY'
is_expired_certificate_blocked
boolean
    Choices:
  • no
  • yes
Whether to block sessions if server's certificate is expired.
Required when type is 'SSL_FORWARD_PROXY'
is_out_of_capacity_blocked
boolean / required
    Choices:
  • no
  • yes
Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
is_revocation_status_timeout_blocked
boolean
    Choices:
  • no
  • yes
Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
Required when type is 'SSL_FORWARD_PROXY'
is_unknown_revocation_status_blocked
boolean
    Choices:
  • no
  • yes
Whether to block sessions if the revocation status check for server's certificate results in "unknown".
Required when type is 'SSL_FORWARD_PROXY'
is_unsupported_cipher_blocked
boolean / required
    Choices:
  • no
  • yes
Whether to block sessions if SSL cipher suite is not supported.
is_unsupported_version_blocked
boolean / required
    Choices:
  • no
  • yes
Whether to block sessions if SSL version is not supported.
is_untrusted_issuer_blocked
boolean
    Choices:
  • no
  • yes
Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
Required when type is 'SSL_FORWARD_PROXY'
type
string / required
    Choices:
  • SSL_INBOUND_INSPECTION
  • SSL_FORWARD_PROXY
Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
decryption_rules
list / elements=dictionary
List of Decryption Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
This parameter is updatable.
action
string / required
    Choices:
  • NO_DECRYPT
  • DECRYPT
Action:
* NO_DECRYPT - Matching traffic is not decrypted. * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
condition
dictionary / required
destinations
list / elements=string
An array of IP address list names to be evaluated against the traffic destination address.
sources
list / elements=string
An array of IP address list names to be evaluated against the traffic source address.
decryption_profile
string
The name of the decryption profile to use.
name
string / required
Name for the decryption rule, must be unique within the policy.
secret
string
The name of a mapped secret. Its `type` must match that of the specified decryption profile.
defined_tags
dictionary
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace": {"bar-key": "value"}}`
This parameter is updatable.
display_name
string
A user-friendly optional name for the firewall policy. Avoid entering confidential information.
Required for create, update, delete when environment variable OCI_USE_NAME_AS_IDENTIFIER is set.
This parameter is updatable when OCI_USE_NAME_AS_IDENTIFIER is not set.

aliases: name
force_create
boolean
    Choices:
  • no ←
  • yes
Whether to attempt non-idempotent creation of a resource. By default, create resource is an idempotent operation, and doesn't create the resource if it already exists. Setting this option to true, forcefully creates a copy of the resource, even if it already exists.This option is mutually exclusive with key_by.
freeform_tags
dictionary
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`
This parameter is updatable.
ip_address_lists
dictionary
Map defining IP address lists of the policy. The value of an entry is a list of IP addresses or prefixes in CIDR notation. The associated key is the identifier by which the IP address list is referenced.
This parameter is updatable.
key_by
list / elements=string
The list of attributes of this resource which should be used to uniquely identify an instance of the resource. By default, all the attributes of a resource are used to uniquely identify a resource.
mapped_secrets
dictionary
Map defining secrets of the policy. The value of an entry is a "mapped secret" consisting of a purpose and source. The associated key is the identifier by which the mapped secret is referenced.
This parameter is updatable.
source
string / required
    Choices:
  • OCI_VAULT
Source of the secrets, where the secrets are stored.
type
string / required
    Choices:
  • SSL_INBOUND_INSPECTION
  • SSL_FORWARD_PROXY
Type of the secrets mapped based on the policy.
* `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic. * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
vault_secret_id
string / required
OCID for the Vault Secret to be used.
version_number
integer / required
Version number of the secret to be used.
network_firewall_policy_id
string
Unique Network Firewall Policy identifier
Required for update using state=present when environment variable OCI_USE_NAME_AS_IDENTIFIER is not set.
Required for delete using state=absent when environment variable OCI_USE_NAME_AS_IDENTIFIER is not set.

aliases: id
region
string
The Oracle Cloud Infrastructure region to use for all OCI API requests. If not set, then the value of the OCI_REGION variable, if any, is used. This option is required if the region is not specified through a configuration file (See config_file_location). Please refer to https://docs.us-phoenix-1.oraclecloud.com/Content/General/Concepts/regions.htm for more information on OCI regions.
security_rules
list / elements=dictionary
List of Security Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.
This parameter is updatable.
action
string / required
    Choices:
  • ALLOW
  • DROP
  • REJECT
  • INSPECT
Types of Action on the Traffic flow.
* ALLOW - Allows the traffic. * DROP - Silently drops the traffic, e.g. without sending a TCP reset. * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable. * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
condition
dictionary / required
applications
list / elements=string
An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
destinations
list / elements=string
An array of IP address list names to be evaluated against the traffic destination address.
sources
list / elements=string
An array of IP address list names to be evaluated against the traffic source address.
urls
list / elements=string
An array of URL pattern list names to be evaluated against the HTTP(S) request target.
inspection
string
    Choices:
  • INTRUSION_DETECTION
  • INTRUSION_PREVENTION
Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
* INTRUSION_DETECTION - Intrusion Detection. * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
name
string / required
Name for the Security rule, must be unique within the policy.
state
string
    Choices:
  • present ←
  • absent
The state of the NetworkFirewallPolicy.
Use state=present to create or update a NetworkFirewallPolicy.
Use state=absent to delete a NetworkFirewallPolicy.
tenancy
string
OCID of your tenancy. If not set, then the value of the OCI_TENANCY variable, if any, is used. This option is required if the tenancy OCID is not specified through a configuration file (See config_file_location). To get the tenancy OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm
url_lists
dictionary
Map defining URL pattern lists of the policy. The value of an entry is a list of URL patterns. The associated key is the identifier by which the URL pattern list is referenced.
This parameter is updatable.
wait
boolean
    Choices:
  • no
  • yes ←
Whether to wait for create or delete operation to complete.
wait_timeout
integer
Time, in seconds, to wait when wait=yes. Defaults to 1200 for most of the services but some services might have a longer wait timeout.

Examples

- name: Create network_firewall_policy
  oci_network_firewall_policy:
    # required
    compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"

    # optional
    display_name: display_name_example
    mapped_secrets:
      # required
      source: OCI_VAULT
      type: SSL_INBOUND_INSPECTION
      vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
      version_number: 56
    application_lists: null
    url_lists: null
    ip_address_lists: null
    security_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
        applications: [ "applications_example" ]
        urls: [ "urls_example" ]
      action: ALLOW
    - # optional
      inspection: INTRUSION_DETECTION
    decryption_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
      action: NO_DECRYPT
    - # optional
      decryption_profile: decryption_profile_example
      secret: secret_example
    decryption_profiles:
      # required
      type: SSL_INBOUND_INSPECTION
      is_unsupported_version_blocked: true
      is_unsupported_cipher_blocked: true
      is_out_of_capacity_blocked: true
    freeform_tags: {'Department': 'Finance'}
    defined_tags: {'Operations': {'CostCenter': 'US'}}

- name: Update network_firewall_policy
  oci_network_firewall_policy:
    # required
    network_firewall_policy_id: "ocid1.networkfirewallpolicy.oc1..xxxxxxEXAMPLExxxxxx"

    # optional
    display_name: display_name_example
    mapped_secrets:
      # required
      source: OCI_VAULT
      type: SSL_INBOUND_INSPECTION
      vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
      version_number: 56
    application_lists: null
    url_lists: null
    ip_address_lists: null
    security_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
        applications: [ "applications_example" ]
        urls: [ "urls_example" ]
      action: ALLOW
    - # optional
      inspection: INTRUSION_DETECTION
    decryption_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
      action: NO_DECRYPT
    - # optional
      decryption_profile: decryption_profile_example
      secret: secret_example
    decryption_profiles:
      # required
      type: SSL_INBOUND_INSPECTION
      is_unsupported_version_blocked: true
      is_unsupported_cipher_blocked: true
      is_out_of_capacity_blocked: true
    freeform_tags: {'Department': 'Finance'}
    defined_tags: {'Operations': {'CostCenter': 'US'}}

- name: Update network_firewall_policy using name (when environment variable OCI_USE_NAME_AS_IDENTIFIER is set)
  oci_network_firewall_policy:
    # required
    compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
    display_name: display_name_example

    # optional
    mapped_secrets:
      # required
      source: OCI_VAULT
      type: SSL_INBOUND_INSPECTION
      vault_secret_id: "ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx"
      version_number: 56
    application_lists: null
    url_lists: null
    ip_address_lists: null
    security_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
        applications: [ "applications_example" ]
        urls: [ "urls_example" ]
      action: ALLOW
    - # optional
      inspection: INTRUSION_DETECTION
    decryption_rules:
    - # required
      name: name_example
      condition:
        # optional
        sources: [ "sources_example" ]
        destinations: [ "destinations_example" ]
      action: NO_DECRYPT
    - # optional
      decryption_profile: decryption_profile_example
      secret: secret_example
    decryption_profiles:
      # required
      type: SSL_INBOUND_INSPECTION
      is_unsupported_version_blocked: true
      is_unsupported_cipher_blocked: true
      is_out_of_capacity_blocked: true
    freeform_tags: {'Department': 'Finance'}
    defined_tags: {'Operations': {'CostCenter': 'US'}}

- name: Delete network_firewall_policy
  oci_network_firewall_policy:
    # required
    network_firewall_policy_id: "ocid1.networkfirewallpolicy.oc1..xxxxxxEXAMPLExxxxxx"
    state: absent

- name: Delete network_firewall_policy using name (when environment variable OCI_USE_NAME_AS_IDENTIFIER is set)
  oci_network_firewall_policy:
    # required
    compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
    display_name: display_name_example
    state: absent

Return Values

Common return values are documented here, the following are the fields unique to this module:

Key Returned Description
network_firewall_policy
complex
on success
Details of the NetworkFirewallPolicy resource acted upon by the current operation

Sample:
{'application_lists': {}, 'compartment_id': 'ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx', 'decryption_profiles': {'are_certificate_extensions_restricted': True, 'is_auto_include_alt_name': True, 'is_expired_certificate_blocked': True, 'is_out_of_capacity_blocked': True, 'is_revocation_status_timeout_blocked': True, 'is_unknown_revocation_status_blocked': True, 'is_unsupported_cipher_blocked': True, 'is_unsupported_version_blocked': True, 'is_untrusted_issuer_blocked': True, 'type': 'SSL_INBOUND_INSPECTION'}, 'decryption_rules': [{'action': 'NO_DECRYPT', 'condition': {'destinations': [], 'sources': []}, 'decryption_profile': 'decryption_profile_example', 'name': 'name_example', 'secret': 'secret_example'}], 'defined_tags': {'Operations': {'CostCenter': 'US'}}, 'display_name': 'display_name_example', 'freeform_tags': {'Department': 'Finance'}, 'id': 'ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx', 'ip_address_lists': {}, 'is_firewall_attached': True, 'lifecycle_details': 'lifecycle_details_example', 'lifecycle_state': 'CREATING', 'mapped_secrets': {'source': 'OCI_VAULT', 'type': 'SSL_INBOUND_INSPECTION', 'vault_secret_id': 'ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx', 'version_number': 56}, 'security_rules': [{'action': 'ALLOW', 'condition': {'applications': [], 'destinations': [], 'sources': [], 'urls': []}, 'inspection': 'INTRUSION_DETECTION', 'name': 'name_example'}], 'system_tags': {}, 'time_created': '2013-10-20T19:20:30+01:00', 'time_updated': '2013-10-20T19:20:30+01:00', 'url_lists': {}}
 
application_lists
dictionary
on success
Map defining application lists of the policy. The value of an entry is a list of "applications", each consisting of a protocol identifier (such as TCP, UDP, or ICMP) and protocol- specific parameters (such as a port range). The associated key is the identifier by which the application list is referenced.

 
compartment_id
string
on success
The OCID of the compartment containing the NetworkFirewall Policy.

Sample:
ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx
 
decryption_profiles
complex
on success
Map defining decryption profiles of the policy. The value of an entry is a decryption profile. The associated key is the identifier by which the decryption profile is referenced.

   
are_certificate_extensions_restricted
boolean
on success
Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.

Sample:
True
   
is_auto_include_alt_name
boolean
on success
Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.

Sample:
True
   
is_expired_certificate_blocked
boolean
on success
Whether to block sessions if server's certificate is expired.

Sample:
True
   
is_out_of_capacity_blocked
boolean
on success
Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.

Sample:
True
   
is_revocation_status_timeout_blocked
boolean
on success
Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).

Sample:
True
   
is_unknown_revocation_status_blocked
boolean
on success
Whether to block sessions if the revocation status check for server's certificate results in "unknown".

Sample:
True
   
is_unsupported_cipher_blocked
boolean
on success
Whether to block sessions if SSL cipher suite is not supported.

Sample:
True
   
is_unsupported_version_blocked
boolean
on success
Whether to block sessions if SSL version is not supported.

Sample:
True
   
is_untrusted_issuer_blocked
boolean
on success
Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).

Sample:
True
   
type
string
on success
Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.

Sample:
SSL_INBOUND_INSPECTION
 
decryption_rules
complex
on success
List of Decryption Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.

   
action
string
on success
Action:
* NO_DECRYPT - Matching traffic is not decrypted. * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.

Sample:
NO_DECRYPT
   
condition
complex
on success

     
destinations
list / elements=string
on success
An array of IP address list names to be evaluated against the traffic destination address.

     
sources
list / elements=string
on success
An array of IP address list names to be evaluated against the traffic source address.

   
decryption_profile
string
on success
The name of the decryption profile to use.

Sample:
decryption_profile_example
   
name
string
on success
Name for the decryption rule, must be unique within the policy.

Sample:
name_example
   
secret
string
on success
The name of a mapped secret. Its `type` must match that of the specified decryption profile.

Sample:
secret_example
 
defined_tags
dictionary
on success
Defined tags for this resource. Each key is predefined and scoped to a namespace. Example: `{"foo-namespace": {"bar-key": "value"}}`

Sample:
{'Operations': {'CostCenter': 'US'}}
 
display_name
string
on success
A user-friendly optional name for the firewall policy. Avoid entering confidential information.

Sample:
display_name_example
 
freeform_tags
dictionary
on success
Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`

Sample:
{'Department': 'Finance'}
 
id
string
on success
The OCID of the resource - Network Firewall Policy.

Sample:
ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx
 
ip_address_lists
dictionary
on success
Map defining IP address lists of the policy. The value of an entry is a list of IP addresses or prefixes in CIDR notation. The associated key is the identifier by which the IP address list is referenced.

 
is_firewall_attached
boolean
on success
To determine if any Network Firewall is associated with this Network Firewall Policy.

Sample:
True
 
lifecycle_details
string
on success
A message describing the current state in more detail. For example, can be used to provide actionable information for a resource in Failed state.

Sample:
lifecycle_details_example
 
lifecycle_state
string
on success
The current state of the Network Firewall Policy.

Sample:
CREATING
 
mapped_secrets
complex
on success
Map defining secrets of the policy. The value of an entry is a "mapped secret" consisting of a purpose and source. The associated key is the identifier by which the mapped secret is referenced.

   
source
string
on success
Source of the secrets, where the secrets are stored.

Sample:
OCI_VAULT
   
type
string
on success
Type of the secrets mapped based on the policy.
* `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic. * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.

Sample:
SSL_INBOUND_INSPECTION
   
vault_secret_id
string
on success
OCID for the Vault Secret to be used.

Sample:
ocid1.vaultsecret.oc1..xxxxxxEXAMPLExxxxxx
   
version_number
integer
on success
Version number of the secret to be used.

Sample:
56
 
security_rules
complex
on success
List of Security Rules defining the behavior of the policy. The first rule with a matching condition determines the action taken upon network traffic.

   
action
string
on success
Types of Action on the Traffic flow.
* ALLOW - Allows the traffic. * DROP - Silently drops the traffic, e.g. without sending a TCP reset. * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable. * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.

Sample:
ALLOW
   
condition
complex
on success

     
applications
list / elements=string
on success
An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.

     
destinations
list / elements=string
on success
An array of IP address list names to be evaluated against the traffic destination address.

     
sources
list / elements=string
on success
An array of IP address list names to be evaluated against the traffic source address.

     
urls
list / elements=string
on success
An array of URL pattern list names to be evaluated against the HTTP(S) request target.

   
inspection
string
on success
Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
* INTRUSION_DETECTION - Intrusion Detection. * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.

Sample:
INTRUSION_DETECTION
   
name
string
on success
Name for the Security rule, must be unique within the policy.

Sample:
name_example
 
system_tags
dictionary
on success
Usage of system tag keys. These predefined keys are scoped to namespaces. Example: `{"orcl-cloud": {"free-tier-retained": "true"}}`

 
time_created
string
on success
The time instant at which the Network Firewall Policy was created in the format defined by RFC3339. Example: `2016-08-25T21:10:29.600Z`

Sample:
2013-10-20T19:20:30+01:00
 
time_updated
string
on success
The time instant at which the Network Firewall Policy was updated in the format defined by RFC3339. Example: `2016-08-25T21:10:29.600Z`

Sample:
2013-10-20T19:20:30+01:00
 
url_lists
dictionary
on success
Map defining URL pattern lists of the policy. The value of an entry is a list of URL patterns. The associated key is the identifier by which the URL pattern list is referenced.



Authors

  • Oracle (@oracle)