azure-native.network.FirewallPolicy
Explore with Pulumi AI
FirewallPolicy Resource. Azure REST API version: 2023-02-01. Prior API version in Azure Native 1.x: 2020-11-01.
Other available API versions: 2020-04-01, 2021-08-01, 2023-04-01, 2023-05-01, 2023-06-01, 2023-09-01, 2023-11-01, 2024-01-01, 2024-03-01, 2024-05-01.
Example Usage
Create FirewallPolicy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() => 
{
    var firewallPolicy = new AzureNative.Network.FirewallPolicy("firewallPolicy", new()
    {
        DnsSettings = new AzureNative.Network.Inputs.DnsSettingsArgs
        {
            EnableProxy = true,
            RequireProxyForNetworkRules = false,
            Servers = new[]
            {
                "30.3.4.5",
            },
        },
        ExplicitProxy = new AzureNative.Network.Inputs.ExplicitProxyArgs
        {
            EnableExplicitProxy = true,
            EnablePacFile = true,
            HttpPort = 8087,
            HttpsPort = 8087,
            PacFile = "https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D",
            PacFilePort = 8087,
        },
        FirewallPolicyName = "firewallPolicy",
        Insights = new AzureNative.Network.Inputs.FirewallPolicyInsightsArgs
        {
            IsEnabled = true,
            LogAnalyticsResources = new AzureNative.Network.Inputs.FirewallPolicyLogAnalyticsResourcesArgs
            {
                DefaultWorkspaceId = new AzureNative.Network.Inputs.SubResourceArgs
                {
                    Id = "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace",
                },
                Workspaces = new[]
                {
                    new AzureNative.Network.Inputs.FirewallPolicyLogAnalyticsWorkspaceArgs
                    {
                        Region = "westus",
                        WorkspaceId = new AzureNative.Network.Inputs.SubResourceArgs
                        {
                            Id = "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1",
                        },
                    },
                    new AzureNative.Network.Inputs.FirewallPolicyLogAnalyticsWorkspaceArgs
                    {
                        Region = "eastus",
                        WorkspaceId = new AzureNative.Network.Inputs.SubResourceArgs
                        {
                            Id = "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2",
                        },
                    },
                },
            },
            RetentionDays = 100,
        },
        IntrusionDetection = new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionArgs
        {
            Configuration = new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionConfigurationArgs
            {
                BypassTrafficSettings = new[]
                {
                    new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs
                    {
                        Description = "Rule 1",
                        DestinationAddresses = new[]
                        {
                            "5.6.7.8",
                        },
                        DestinationPorts = new[]
                        {
                            "*",
                        },
                        Name = "bypassRule1",
                        Protocol = AzureNative.Network.FirewallPolicyIntrusionDetectionProtocol.TCP,
                        SourceAddresses = new[]
                        {
                            "1.2.3.4",
                        },
                    },
                },
                SignatureOverrides = new[]
                {
                    new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionSignatureSpecificationArgs
                    {
                        Id = "2525004",
                        Mode = AzureNative.Network.FirewallPolicyIntrusionDetectionStateType.Deny,
                    },
                },
            },
            Mode = AzureNative.Network.FirewallPolicyIntrusionDetectionStateType.Alert,
        },
        Location = "West US",
        ResourceGroupName = "rg1",
        Sku = new AzureNative.Network.Inputs.FirewallPolicySkuArgs
        {
            Tier = AzureNative.Network.FirewallPolicySkuTier.Premium,
        },
        Snat = new AzureNative.Network.Inputs.FirewallPolicySNATArgs
        {
            PrivateRanges = new[]
            {
                "IANAPrivateRanges",
            },
        },
        Sql = new AzureNative.Network.Inputs.FirewallPolicySQLArgs
        {
            AllowSqlRedirect = true,
        },
        Tags = 
        {
            { "key1", "value1" },
        },
        ThreatIntelMode = AzureNative.Network.AzureFirewallThreatIntelMode.Alert,
        ThreatIntelWhitelist = new AzureNative.Network.Inputs.FirewallPolicyThreatIntelWhitelistArgs
        {
            Fqdns = new[]
            {
                "*.microsoft.com",
            },
            IpAddresses = new[]
            {
                "20.3.4.5",
            },
        },
        TransportSecurity = new AzureNative.Network.Inputs.FirewallPolicyTransportSecurityArgs
        {
            CertificateAuthority = new AzureNative.Network.Inputs.FirewallPolicyCertificateAuthorityArgs
            {
                KeyVaultSecretId = "https://kv/secret",
                Name = "clientcert",
            },
        },
    });
});
package main
import (
	network "github.com/pulumi/pulumi-azure-native-sdk/network/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := network.NewFirewallPolicy(ctx, "firewallPolicy", &network.FirewallPolicyArgs{
			DnsSettings: &network.DnsSettingsArgs{
				EnableProxy:                 pulumi.Bool(true),
				RequireProxyForNetworkRules: pulumi.Bool(false),
				Servers: pulumi.StringArray{
					pulumi.String("30.3.4.5"),
				},
			},
			ExplicitProxy: &network.ExplicitProxyArgs{
				EnableExplicitProxy: pulumi.Bool(true),
				EnablePacFile:       pulumi.Bool(true),
				HttpPort:            pulumi.Int(8087),
				HttpsPort:           pulumi.Int(8087),
				PacFile:             pulumi.String("https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D"),
				PacFilePort:         pulumi.Int(8087),
			},
			FirewallPolicyName: pulumi.String("firewallPolicy"),
			Insights: &network.FirewallPolicyInsightsArgs{
				IsEnabled: pulumi.Bool(true),
				LogAnalyticsResources: &network.FirewallPolicyLogAnalyticsResourcesArgs{
					DefaultWorkspaceId: &network.SubResourceArgs{
						Id: pulumi.String("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace"),
					},
					Workspaces: network.FirewallPolicyLogAnalyticsWorkspaceArray{
						&network.FirewallPolicyLogAnalyticsWorkspaceArgs{
							Region: pulumi.String("westus"),
							WorkspaceId: &network.SubResourceArgs{
								Id: pulumi.String("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1"),
							},
						},
						&network.FirewallPolicyLogAnalyticsWorkspaceArgs{
							Region: pulumi.String("eastus"),
							WorkspaceId: &network.SubResourceArgs{
								Id: pulumi.String("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2"),
							},
						},
					},
				},
				RetentionDays: pulumi.Int(100),
			},
			IntrusionDetection: &network.FirewallPolicyIntrusionDetectionArgs{
				Configuration: &network.FirewallPolicyIntrusionDetectionConfigurationArgs{
					BypassTrafficSettings: network.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArray{
						&network.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs{
							Description: pulumi.String("Rule 1"),
							DestinationAddresses: pulumi.StringArray{
								pulumi.String("5.6.7.8"),
							},
							DestinationPorts: pulumi.StringArray{
								pulumi.String("*"),
							},
							Name:     pulumi.String("bypassRule1"),
							Protocol: pulumi.String(network.FirewallPolicyIntrusionDetectionProtocolTCP),
							SourceAddresses: pulumi.StringArray{
								pulumi.String("1.2.3.4"),
							},
						},
					},
					SignatureOverrides: network.FirewallPolicyIntrusionDetectionSignatureSpecificationArray{
						&network.FirewallPolicyIntrusionDetectionSignatureSpecificationArgs{
							Id:   pulumi.String("2525004"),
							Mode: pulumi.String(network.FirewallPolicyIntrusionDetectionStateTypeDeny),
						},
					},
				},
				Mode: pulumi.String(network.FirewallPolicyIntrusionDetectionStateTypeAlert),
			},
			Location:          pulumi.String("West US"),
			ResourceGroupName: pulumi.String("rg1"),
			Sku: &network.FirewallPolicySkuArgs{
				Tier: pulumi.String(network.FirewallPolicySkuTierPremium),
			},
			Snat: &network.FirewallPolicySNATArgs{
				PrivateRanges: pulumi.StringArray{
					pulumi.String("IANAPrivateRanges"),
				},
			},
			Sql: &network.FirewallPolicySQLArgs{
				AllowSqlRedirect: pulumi.Bool(true),
			},
			Tags: pulumi.StringMap{
				"key1": pulumi.String("value1"),
			},
			ThreatIntelMode: pulumi.String(network.AzureFirewallThreatIntelModeAlert),
			ThreatIntelWhitelist: &network.FirewallPolicyThreatIntelWhitelistArgs{
				Fqdns: pulumi.StringArray{
					pulumi.String("*.microsoft.com"),
				},
				IpAddresses: pulumi.StringArray{
					pulumi.String("20.3.4.5"),
				},
			},
			TransportSecurity: &network.FirewallPolicyTransportSecurityArgs{
				CertificateAuthority: &network.FirewallPolicyCertificateAuthorityArgs{
					KeyVaultSecretId: pulumi.String("https://kv/secret"),
					Name:             pulumi.String("clientcert"),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.network.FirewallPolicy;
import com.pulumi.azurenative.network.FirewallPolicyArgs;
import com.pulumi.azurenative.network.inputs.DnsSettingsArgs;
import com.pulumi.azurenative.network.inputs.ExplicitProxyArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyInsightsArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyLogAnalyticsResourcesArgs;
import com.pulumi.azurenative.network.inputs.SubResourceArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyIntrusionDetectionArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyIntrusionDetectionConfigurationArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicySkuArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicySNATArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicySQLArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyThreatIntelWhitelistArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyTransportSecurityArgs;
import com.pulumi.azurenative.network.inputs.FirewallPolicyCertificateAuthorityArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var firewallPolicy = new FirewallPolicy("firewallPolicy", FirewallPolicyArgs.builder()
            .dnsSettings(DnsSettingsArgs.builder()
                .enableProxy(true)
                .requireProxyForNetworkRules(false)
                .servers("30.3.4.5")
                .build())
            .explicitProxy(ExplicitProxyArgs.builder()
                .enableExplicitProxy(true)
                .enablePacFile(true)
                .httpPort(8087)
                .httpsPort(8087)
                .pacFile("https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D")
                .pacFilePort(8087)
                .build())
            .firewallPolicyName("firewallPolicy")
            .insights(FirewallPolicyInsightsArgs.builder()
                .isEnabled(true)
                .logAnalyticsResources(FirewallPolicyLogAnalyticsResourcesArgs.builder()
                    .defaultWorkspaceId(SubResourceArgs.builder()
                        .id("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace")
                        .build())
                    .workspaces(                    
                        FirewallPolicyLogAnalyticsWorkspaceArgs.builder()
                            .region("westus")
                            .workspaceId(SubResourceArgs.builder()
                                .id("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1")
                                .build())
                            .build(),
                        FirewallPolicyLogAnalyticsWorkspaceArgs.builder()
                            .region("eastus")
                            .workspaceId(SubResourceArgs.builder()
                                .id("/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2")
                                .build())
                            .build())
                    .build())
                .retentionDays(100)
                .build())
            .intrusionDetection(FirewallPolicyIntrusionDetectionArgs.builder()
                .configuration(FirewallPolicyIntrusionDetectionConfigurationArgs.builder()
                    .bypassTrafficSettings(FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs.builder()
                        .description("Rule 1")
                        .destinationAddresses("5.6.7.8")
                        .destinationPorts("*")
                        .name("bypassRule1")
                        .protocol("TCP")
                        .sourceAddresses("1.2.3.4")
                        .build())
                    .signatureOverrides(FirewallPolicyIntrusionDetectionSignatureSpecificationArgs.builder()
                        .id("2525004")
                        .mode("Deny")
                        .build())
                    .build())
                .mode("Alert")
                .build())
            .location("West US")
            .resourceGroupName("rg1")
            .sku(FirewallPolicySkuArgs.builder()
                .tier("Premium")
                .build())
            .snat(FirewallPolicySNATArgs.builder()
                .privateRanges("IANAPrivateRanges")
                .build())
            .sql(FirewallPolicySQLArgs.builder()
                .allowSqlRedirect(true)
                .build())
            .tags(Map.of("key1", "value1"))
            .threatIntelMode("Alert")
            .threatIntelWhitelist(FirewallPolicyThreatIntelWhitelistArgs.builder()
                .fqdns("*.microsoft.com")
                .ipAddresses("20.3.4.5")
                .build())
            .transportSecurity(FirewallPolicyTransportSecurityArgs.builder()
                .certificateAuthority(FirewallPolicyCertificateAuthorityArgs.builder()
                    .keyVaultSecretId("https://kv/secret")
                    .name("clientcert")
                    .build())
                .build())
            .build());
    }
}
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const firewallPolicy = new azure_native.network.FirewallPolicy("firewallPolicy", {
    dnsSettings: {
        enableProxy: true,
        requireProxyForNetworkRules: false,
        servers: ["30.3.4.5"],
    },
    explicitProxy: {
        enableExplicitProxy: true,
        enablePacFile: true,
        httpPort: 8087,
        httpsPort: 8087,
        pacFile: "https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D",
        pacFilePort: 8087,
    },
    firewallPolicyName: "firewallPolicy",
    insights: {
        isEnabled: true,
        logAnalyticsResources: {
            defaultWorkspaceId: {
                id: "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace",
            },
            workspaces: [
                {
                    region: "westus",
                    workspaceId: {
                        id: "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1",
                    },
                },
                {
                    region: "eastus",
                    workspaceId: {
                        id: "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2",
                    },
                },
            ],
        },
        retentionDays: 100,
    },
    intrusionDetection: {
        configuration: {
            bypassTrafficSettings: [{
                description: "Rule 1",
                destinationAddresses: ["5.6.7.8"],
                destinationPorts: ["*"],
                name: "bypassRule1",
                protocol: azure_native.network.FirewallPolicyIntrusionDetectionProtocol.TCP,
                sourceAddresses: ["1.2.3.4"],
            }],
            signatureOverrides: [{
                id: "2525004",
                mode: azure_native.network.FirewallPolicyIntrusionDetectionStateType.Deny,
            }],
        },
        mode: azure_native.network.FirewallPolicyIntrusionDetectionStateType.Alert,
    },
    location: "West US",
    resourceGroupName: "rg1",
    sku: {
        tier: azure_native.network.FirewallPolicySkuTier.Premium,
    },
    snat: {
        privateRanges: ["IANAPrivateRanges"],
    },
    sql: {
        allowSqlRedirect: true,
    },
    tags: {
        key1: "value1",
    },
    threatIntelMode: azure_native.network.AzureFirewallThreatIntelMode.Alert,
    threatIntelWhitelist: {
        fqdns: ["*.microsoft.com"],
        ipAddresses: ["20.3.4.5"],
    },
    transportSecurity: {
        certificateAuthority: {
            keyVaultSecretId: "https://kv/secret",
            name: "clientcert",
        },
    },
});
import pulumi
import pulumi_azure_native as azure_native
firewall_policy = azure_native.network.FirewallPolicy("firewallPolicy",
    dns_settings={
        "enable_proxy": True,
        "require_proxy_for_network_rules": False,
        "servers": ["30.3.4.5"],
    },
    explicit_proxy={
        "enable_explicit_proxy": True,
        "enable_pac_file": True,
        "http_port": 8087,
        "https_port": 8087,
        "pac_file": "https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D",
        "pac_file_port": 8087,
    },
    firewall_policy_name="firewallPolicy",
    insights={
        "is_enabled": True,
        "log_analytics_resources": {
            "default_workspace_id": {
                "id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace",
            },
            "workspaces": [
                {
                    "region": "westus",
                    "workspace_id": {
                        "id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1",
                    },
                },
                {
                    "region": "eastus",
                    "workspace_id": {
                        "id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2",
                    },
                },
            ],
        },
        "retention_days": 100,
    },
    intrusion_detection={
        "configuration": {
            "bypass_traffic_settings": [{
                "description": "Rule 1",
                "destination_addresses": ["5.6.7.8"],
                "destination_ports": ["*"],
                "name": "bypassRule1",
                "protocol": azure_native.network.FirewallPolicyIntrusionDetectionProtocol.TCP,
                "source_addresses": ["1.2.3.4"],
            }],
            "signature_overrides": [{
                "id": "2525004",
                "mode": azure_native.network.FirewallPolicyIntrusionDetectionStateType.DENY,
            }],
        },
        "mode": azure_native.network.FirewallPolicyIntrusionDetectionStateType.ALERT,
    },
    location="West US",
    resource_group_name="rg1",
    sku={
        "tier": azure_native.network.FirewallPolicySkuTier.PREMIUM,
    },
    snat={
        "private_ranges": ["IANAPrivateRanges"],
    },
    sql={
        "allow_sql_redirect": True,
    },
    tags={
        "key1": "value1",
    },
    threat_intel_mode=azure_native.network.AzureFirewallThreatIntelMode.ALERT,
    threat_intel_whitelist={
        "fqdns": ["*.microsoft.com"],
        "ip_addresses": ["20.3.4.5"],
    },
    transport_security={
        "certificate_authority": {
            "key_vault_secret_id": "https://kv/secret",
            "name": "clientcert",
        },
    })
resources:
  firewallPolicy:
    type: azure-native:network:FirewallPolicy
    properties:
      dnsSettings:
        enableProxy: true
        requireProxyForNetworkRules: false
        servers:
          - 30.3.4.5
      explicitProxy:
        enableExplicitProxy: true
        enablePacFile: true
        httpPort: 8087
        httpsPort: 8087
        pacFile: https://tinawstorage.file.core.windows.net/?sv=2020-02-10&ss=bfqt&srt=sco&sp=rwdlacuptfx&se=2021-06-04T07:01:12Z&st=2021-06-03T23:01:12Z&sip=68.65.171.11&spr=https&sig=Plsa0RRVpGbY0IETZZOT6znOHcSro71LLTTbzquYPgs%3D
        pacFilePort: 8087
      firewallPolicyName: firewallPolicy
      insights:
        isEnabled: true
        logAnalyticsResources:
          defaultWorkspaceId:
            id: /subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace
          workspaces:
            - region: westus
              workspaceId:
                id: /subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1
            - region: eastus
              workspaceId:
                id: /subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2
        retentionDays: 100
      intrusionDetection:
        configuration:
          bypassTrafficSettings:
            - description: Rule 1
              destinationAddresses:
                - 5.6.7.8
              destinationPorts:
                - '*'
              name: bypassRule1
              protocol: TCP
              sourceAddresses:
                - 1.2.3.4
          signatureOverrides:
            - id: '2525004'
              mode: Deny
        mode: Alert
      location: West US
      resourceGroupName: rg1
      sku:
        tier: Premium
      snat:
        privateRanges:
          - IANAPrivateRanges
      sql:
        allowSqlRedirect: true
      tags:
        key1: value1
      threatIntelMode: Alert
      threatIntelWhitelist:
        fqdns:
          - '*.microsoft.com'
        ipAddresses:
          - 20.3.4.5
      transportSecurity:
        certificateAuthority:
          keyVaultSecretId: https://kv/secret
          name: clientcert
Create FirewallPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new FirewallPolicy(name: string, args: FirewallPolicyArgs, opts?: CustomResourceOptions);@overload
def FirewallPolicy(resource_name: str,
                   args: FirewallPolicyArgs,
                   opts: Optional[ResourceOptions] = None)
@overload
def FirewallPolicy(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   resource_group_name: Optional[str] = None,
                   location: Optional[str] = None,
                   intrusion_detection: Optional[FirewallPolicyIntrusionDetectionArgs] = None,
                   firewall_policy_name: Optional[str] = None,
                   id: Optional[str] = None,
                   dns_settings: Optional[DnsSettingsArgs] = None,
                   insights: Optional[FirewallPolicyInsightsArgs] = None,
                   explicit_proxy: Optional[ExplicitProxyArgs] = None,
                   base_policy: Optional[SubResourceArgs] = None,
                   identity: Optional[ManagedServiceIdentityArgs] = None,
                   sku: Optional[FirewallPolicySkuArgs] = None,
                   snat: Optional[FirewallPolicySNATArgs] = None,
                   sql: Optional[FirewallPolicySQLArgs] = None,
                   tags: Optional[Mapping[str, str]] = None,
                   threat_intel_mode: Optional[Union[str, AzureFirewallThreatIntelMode]] = None,
                   threat_intel_whitelist: Optional[FirewallPolicyThreatIntelWhitelistArgs] = None,
                   transport_security: Optional[FirewallPolicyTransportSecurityArgs] = None)func NewFirewallPolicy(ctx *Context, name string, args FirewallPolicyArgs, opts ...ResourceOption) (*FirewallPolicy, error)public FirewallPolicy(string name, FirewallPolicyArgs args, CustomResourceOptions? opts = null)
public FirewallPolicy(String name, FirewallPolicyArgs args)
public FirewallPolicy(String name, FirewallPolicyArgs args, CustomResourceOptions options)
type: azure-native:network:FirewallPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var firewallPolicyResource = new AzureNative.Network.FirewallPolicy("firewallPolicyResource", new()
{
    ResourceGroupName = "string",
    Location = "string",
    IntrusionDetection = new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionArgs
    {
        Configuration = new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionConfigurationArgs
        {
            BypassTrafficSettings = new[]
            {
                new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs
                {
                    Description = "string",
                    DestinationAddresses = new[]
                    {
                        "string",
                    },
                    DestinationIpGroups = new[]
                    {
                        "string",
                    },
                    DestinationPorts = new[]
                    {
                        "string",
                    },
                    Name = "string",
                    Protocol = "string",
                    SourceAddresses = new[]
                    {
                        "string",
                    },
                    SourceIpGroups = new[]
                    {
                        "string",
                    },
                },
            },
            PrivateRanges = new[]
            {
                "string",
            },
            SignatureOverrides = new[]
            {
                new AzureNative.Network.Inputs.FirewallPolicyIntrusionDetectionSignatureSpecificationArgs
                {
                    Id = "string",
                    Mode = "string",
                },
            },
        },
        Mode = "string",
        Profile = "string",
    },
    FirewallPolicyName = "string",
    Id = "string",
    DnsSettings = new AzureNative.Network.Inputs.DnsSettingsArgs
    {
        EnableProxy = false,
        RequireProxyForNetworkRules = false,
        Servers = new[]
        {
            "string",
        },
    },
    Insights = new AzureNative.Network.Inputs.FirewallPolicyInsightsArgs
    {
        IsEnabled = false,
        LogAnalyticsResources = new AzureNative.Network.Inputs.FirewallPolicyLogAnalyticsResourcesArgs
        {
            DefaultWorkspaceId = new AzureNative.Network.Inputs.SubResourceArgs
            {
                Id = "string",
            },
            Workspaces = new[]
            {
                new AzureNative.Network.Inputs.FirewallPolicyLogAnalyticsWorkspaceArgs
                {
                    Region = "string",
                    WorkspaceId = new AzureNative.Network.Inputs.SubResourceArgs
                    {
                        Id = "string",
                    },
                },
            },
        },
        RetentionDays = 0,
    },
    ExplicitProxy = new AzureNative.Network.Inputs.ExplicitProxyArgs
    {
        EnableExplicitProxy = false,
        EnablePacFile = false,
        HttpPort = 0,
        HttpsPort = 0,
        PacFile = "string",
        PacFilePort = 0,
    },
    BasePolicy = new AzureNative.Network.Inputs.SubResourceArgs
    {
        Id = "string",
    },
    Identity = new AzureNative.Network.Inputs.ManagedServiceIdentityArgs
    {
        Type = AzureNative.Network.ResourceIdentityType.SystemAssigned,
        UserAssignedIdentities = new[]
        {
            "string",
        },
    },
    Sku = new AzureNative.Network.Inputs.FirewallPolicySkuArgs
    {
        Tier = "string",
    },
    Snat = new AzureNative.Network.Inputs.FirewallPolicySNATArgs
    {
        AutoLearnPrivateRanges = "string",
        PrivateRanges = new[]
        {
            "string",
        },
    },
    Sql = new AzureNative.Network.Inputs.FirewallPolicySQLArgs
    {
        AllowSqlRedirect = false,
    },
    Tags = 
    {
        { "string", "string" },
    },
    ThreatIntelMode = "string",
    ThreatIntelWhitelist = new AzureNative.Network.Inputs.FirewallPolicyThreatIntelWhitelistArgs
    {
        Fqdns = new[]
        {
            "string",
        },
        IpAddresses = new[]
        {
            "string",
        },
    },
    TransportSecurity = new AzureNative.Network.Inputs.FirewallPolicyTransportSecurityArgs
    {
        CertificateAuthority = new AzureNative.Network.Inputs.FirewallPolicyCertificateAuthorityArgs
        {
            KeyVaultSecretId = "string",
            Name = "string",
        },
    },
});
example, err := network.NewFirewallPolicy(ctx, "firewallPolicyResource", &network.FirewallPolicyArgs{
	ResourceGroupName: pulumi.String("string"),
	Location:          pulumi.String("string"),
	IntrusionDetection: &network.FirewallPolicyIntrusionDetectionArgs{
		Configuration: &network.FirewallPolicyIntrusionDetectionConfigurationArgs{
			BypassTrafficSettings: network.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArray{
				&network.FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs{
					Description: pulumi.String("string"),
					DestinationAddresses: pulumi.StringArray{
						pulumi.String("string"),
					},
					DestinationIpGroups: pulumi.StringArray{
						pulumi.String("string"),
					},
					DestinationPorts: pulumi.StringArray{
						pulumi.String("string"),
					},
					Name:     pulumi.String("string"),
					Protocol: pulumi.String("string"),
					SourceAddresses: pulumi.StringArray{
						pulumi.String("string"),
					},
					SourceIpGroups: pulumi.StringArray{
						pulumi.String("string"),
					},
				},
			},
			PrivateRanges: pulumi.StringArray{
				pulumi.String("string"),
			},
			SignatureOverrides: network.FirewallPolicyIntrusionDetectionSignatureSpecificationArray{
				&network.FirewallPolicyIntrusionDetectionSignatureSpecificationArgs{
					Id:   pulumi.String("string"),
					Mode: pulumi.String("string"),
				},
			},
		},
		Mode:    pulumi.String("string"),
		Profile: pulumi.String("string"),
	},
	FirewallPolicyName: pulumi.String("string"),
	Id:                 pulumi.String("string"),
	DnsSettings: &network.DnsSettingsArgs{
		EnableProxy:                 pulumi.Bool(false),
		RequireProxyForNetworkRules: pulumi.Bool(false),
		Servers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Insights: &network.FirewallPolicyInsightsArgs{
		IsEnabled: pulumi.Bool(false),
		LogAnalyticsResources: &network.FirewallPolicyLogAnalyticsResourcesArgs{
			DefaultWorkspaceId: &network.SubResourceArgs{
				Id: pulumi.String("string"),
			},
			Workspaces: network.FirewallPolicyLogAnalyticsWorkspaceArray{
				&network.FirewallPolicyLogAnalyticsWorkspaceArgs{
					Region: pulumi.String("string"),
					WorkspaceId: &network.SubResourceArgs{
						Id: pulumi.String("string"),
					},
				},
			},
		},
		RetentionDays: pulumi.Int(0),
	},
	ExplicitProxy: &network.ExplicitProxyArgs{
		EnableExplicitProxy: pulumi.Bool(false),
		EnablePacFile:       pulumi.Bool(false),
		HttpPort:            pulumi.Int(0),
		HttpsPort:           pulumi.Int(0),
		PacFile:             pulumi.String("string"),
		PacFilePort:         pulumi.Int(0),
	},
	BasePolicy: &network.SubResourceArgs{
		Id: pulumi.String("string"),
	},
	Identity: &network.ManagedServiceIdentityArgs{
		Type: network.ResourceIdentityTypeSystemAssigned,
		UserAssignedIdentities: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Sku: &network.FirewallPolicySkuArgs{
		Tier: pulumi.String("string"),
	},
	Snat: &network.FirewallPolicySNATArgs{
		AutoLearnPrivateRanges: pulumi.String("string"),
		PrivateRanges: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Sql: &network.FirewallPolicySQLArgs{
		AllowSqlRedirect: pulumi.Bool(false),
	},
	Tags: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	ThreatIntelMode: pulumi.String("string"),
	ThreatIntelWhitelist: &network.FirewallPolicyThreatIntelWhitelistArgs{
		Fqdns: pulumi.StringArray{
			pulumi.String("string"),
		},
		IpAddresses: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	TransportSecurity: &network.FirewallPolicyTransportSecurityArgs{
		CertificateAuthority: &network.FirewallPolicyCertificateAuthorityArgs{
			KeyVaultSecretId: pulumi.String("string"),
			Name:             pulumi.String("string"),
		},
	},
})
var firewallPolicyResource = new FirewallPolicy("firewallPolicyResource", FirewallPolicyArgs.builder()
    .resourceGroupName("string")
    .location("string")
    .intrusionDetection(FirewallPolicyIntrusionDetectionArgs.builder()
        .configuration(FirewallPolicyIntrusionDetectionConfigurationArgs.builder()
            .bypassTrafficSettings(FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs.builder()
                .description("string")
                .destinationAddresses("string")
                .destinationIpGroups("string")
                .destinationPorts("string")
                .name("string")
                .protocol("string")
                .sourceAddresses("string")
                .sourceIpGroups("string")
                .build())
            .privateRanges("string")
            .signatureOverrides(FirewallPolicyIntrusionDetectionSignatureSpecificationArgs.builder()
                .id("string")
                .mode("string")
                .build())
            .build())
        .mode("string")
        .profile("string")
        .build())
    .firewallPolicyName("string")
    .id("string")
    .dnsSettings(DnsSettingsArgs.builder()
        .enableProxy(false)
        .requireProxyForNetworkRules(false)
        .servers("string")
        .build())
    .insights(FirewallPolicyInsightsArgs.builder()
        .isEnabled(false)
        .logAnalyticsResources(FirewallPolicyLogAnalyticsResourcesArgs.builder()
            .defaultWorkspaceId(SubResourceArgs.builder()
                .id("string")
                .build())
            .workspaces(FirewallPolicyLogAnalyticsWorkspaceArgs.builder()
                .region("string")
                .workspaceId(SubResourceArgs.builder()
                    .id("string")
                    .build())
                .build())
            .build())
        .retentionDays(0)
        .build())
    .explicitProxy(ExplicitProxyArgs.builder()
        .enableExplicitProxy(false)
        .enablePacFile(false)
        .httpPort(0)
        .httpsPort(0)
        .pacFile("string")
        .pacFilePort(0)
        .build())
    .basePolicy(SubResourceArgs.builder()
        .id("string")
        .build())
    .identity(ManagedServiceIdentityArgs.builder()
        .type("SystemAssigned")
        .userAssignedIdentities("string")
        .build())
    .sku(FirewallPolicySkuArgs.builder()
        .tier("string")
        .build())
    .snat(FirewallPolicySNATArgs.builder()
        .autoLearnPrivateRanges("string")
        .privateRanges("string")
        .build())
    .sql(FirewallPolicySQLArgs.builder()
        .allowSqlRedirect(false)
        .build())
    .tags(Map.of("string", "string"))
    .threatIntelMode("string")
    .threatIntelWhitelist(FirewallPolicyThreatIntelWhitelistArgs.builder()
        .fqdns("string")
        .ipAddresses("string")
        .build())
    .transportSecurity(FirewallPolicyTransportSecurityArgs.builder()
        .certificateAuthority(FirewallPolicyCertificateAuthorityArgs.builder()
            .keyVaultSecretId("string")
            .name("string")
            .build())
        .build())
    .build());
firewall_policy_resource = azure_native.network.FirewallPolicy("firewallPolicyResource",
    resource_group_name="string",
    location="string",
    intrusion_detection={
        "configuration": {
            "bypass_traffic_settings": [{
                "description": "string",
                "destination_addresses": ["string"],
                "destination_ip_groups": ["string"],
                "destination_ports": ["string"],
                "name": "string",
                "protocol": "string",
                "source_addresses": ["string"],
                "source_ip_groups": ["string"],
            }],
            "private_ranges": ["string"],
            "signature_overrides": [{
                "id": "string",
                "mode": "string",
            }],
        },
        "mode": "string",
        "profile": "string",
    },
    firewall_policy_name="string",
    id="string",
    dns_settings={
        "enable_proxy": False,
        "require_proxy_for_network_rules": False,
        "servers": ["string"],
    },
    insights={
        "is_enabled": False,
        "log_analytics_resources": {
            "default_workspace_id": {
                "id": "string",
            },
            "workspaces": [{
                "region": "string",
                "workspace_id": {
                    "id": "string",
                },
            }],
        },
        "retention_days": 0,
    },
    explicit_proxy={
        "enable_explicit_proxy": False,
        "enable_pac_file": False,
        "http_port": 0,
        "https_port": 0,
        "pac_file": "string",
        "pac_file_port": 0,
    },
    base_policy={
        "id": "string",
    },
    identity={
        "type": azure_native.network.ResourceIdentityType.SYSTEM_ASSIGNED,
        "user_assigned_identities": ["string"],
    },
    sku={
        "tier": "string",
    },
    snat={
        "auto_learn_private_ranges": "string",
        "private_ranges": ["string"],
    },
    sql={
        "allow_sql_redirect": False,
    },
    tags={
        "string": "string",
    },
    threat_intel_mode="string",
    threat_intel_whitelist={
        "fqdns": ["string"],
        "ip_addresses": ["string"],
    },
    transport_security={
        "certificate_authority": {
            "key_vault_secret_id": "string",
            "name": "string",
        },
    })
const firewallPolicyResource = new azure_native.network.FirewallPolicy("firewallPolicyResource", {
    resourceGroupName: "string",
    location: "string",
    intrusionDetection: {
        configuration: {
            bypassTrafficSettings: [{
                description: "string",
                destinationAddresses: ["string"],
                destinationIpGroups: ["string"],
                destinationPorts: ["string"],
                name: "string",
                protocol: "string",
                sourceAddresses: ["string"],
                sourceIpGroups: ["string"],
            }],
            privateRanges: ["string"],
            signatureOverrides: [{
                id: "string",
                mode: "string",
            }],
        },
        mode: "string",
        profile: "string",
    },
    firewallPolicyName: "string",
    id: "string",
    dnsSettings: {
        enableProxy: false,
        requireProxyForNetworkRules: false,
        servers: ["string"],
    },
    insights: {
        isEnabled: false,
        logAnalyticsResources: {
            defaultWorkspaceId: {
                id: "string",
            },
            workspaces: [{
                region: "string",
                workspaceId: {
                    id: "string",
                },
            }],
        },
        retentionDays: 0,
    },
    explicitProxy: {
        enableExplicitProxy: false,
        enablePacFile: false,
        httpPort: 0,
        httpsPort: 0,
        pacFile: "string",
        pacFilePort: 0,
    },
    basePolicy: {
        id: "string",
    },
    identity: {
        type: azure_native.network.ResourceIdentityType.SystemAssigned,
        userAssignedIdentities: ["string"],
    },
    sku: {
        tier: "string",
    },
    snat: {
        autoLearnPrivateRanges: "string",
        privateRanges: ["string"],
    },
    sql: {
        allowSqlRedirect: false,
    },
    tags: {
        string: "string",
    },
    threatIntelMode: "string",
    threatIntelWhitelist: {
        fqdns: ["string"],
        ipAddresses: ["string"],
    },
    transportSecurity: {
        certificateAuthority: {
            keyVaultSecretId: "string",
            name: "string",
        },
    },
});
type: azure-native:network:FirewallPolicy
properties:
    basePolicy:
        id: string
    dnsSettings:
        enableProxy: false
        requireProxyForNetworkRules: false
        servers:
            - string
    explicitProxy:
        enableExplicitProxy: false
        enablePacFile: false
        httpPort: 0
        httpsPort: 0
        pacFile: string
        pacFilePort: 0
    firewallPolicyName: string
    id: string
    identity:
        type: SystemAssigned
        userAssignedIdentities:
            - string
    insights:
        isEnabled: false
        logAnalyticsResources:
            defaultWorkspaceId:
                id: string
            workspaces:
                - region: string
                  workspaceId:
                    id: string
        retentionDays: 0
    intrusionDetection:
        configuration:
            bypassTrafficSettings:
                - description: string
                  destinationAddresses:
                    - string
                  destinationIpGroups:
                    - string
                  destinationPorts:
                    - string
                  name: string
                  protocol: string
                  sourceAddresses:
                    - string
                  sourceIpGroups:
                    - string
            privateRanges:
                - string
            signatureOverrides:
                - id: string
                  mode: string
        mode: string
        profile: string
    location: string
    resourceGroupName: string
    sku:
        tier: string
    snat:
        autoLearnPrivateRanges: string
        privateRanges:
            - string
    sql:
        allowSqlRedirect: false
    tags:
        string: string
    threatIntelMode: string
    threatIntelWhitelist:
        fqdns:
            - string
        ipAddresses:
            - string
    transportSecurity:
        certificateAuthority:
            keyVaultSecretId: string
            name: string
FirewallPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The FirewallPolicy resource accepts the following input properties:
- ResourceGroup stringName 
- The name of the resource group.
- BasePolicy Pulumi.Azure Native. Network. Inputs. Sub Resource 
- The parent firewall policy from which rules are inherited.
- DnsSettings Pulumi.Azure Native. Network. Inputs. Dns Settings 
- DNS Proxy Settings definition.
- ExplicitProxy Pulumi.Azure Native. Network. Inputs. Explicit Proxy 
- Explicit Proxy Settings definition.
- FirewallPolicy stringName 
- The name of the Firewall Policy.
- Id string
- Resource ID.
- Identity
Pulumi.Azure Native. Network. Inputs. Managed Service Identity 
- The identity of the firewall policy.
- Insights
Pulumi.Azure Native. Network. Inputs. Firewall Policy Insights 
- Insights on Firewall Policy.
- IntrusionDetection Pulumi.Azure Native. Network. Inputs. Firewall Policy Intrusion Detection 
- The configuration for Intrusion detection.
- Location string
- Resource location.
- Sku
Pulumi.Azure Native. Network. Inputs. Firewall Policy Sku 
- The Firewall Policy SKU.
- Snat
Pulumi.Azure Native. Network. Inputs. Firewall Policy SNAT 
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- Sql
Pulumi.Azure Native. Network. Inputs. Firewall Policy SQL 
- SQL Settings definition.
- Dictionary<string, string>
- Resource tags.
- ThreatIntel string | Pulumi.Mode Azure Native. Network. Azure Firewall Threat Intel Mode 
- The operation mode for Threat Intelligence.
- ThreatIntel Pulumi.Whitelist Azure Native. Network. Inputs. Firewall Policy Threat Intel Whitelist 
- ThreatIntel Whitelist for Firewall Policy.
- TransportSecurity Pulumi.Azure Native. Network. Inputs. Firewall Policy Transport Security 
- TLS Configuration definition.
- ResourceGroup stringName 
- The name of the resource group.
- BasePolicy SubResource Args 
- The parent firewall policy from which rules are inherited.
- DnsSettings DnsSettings Args 
- DNS Proxy Settings definition.
- ExplicitProxy ExplicitProxy Args 
- Explicit Proxy Settings definition.
- FirewallPolicy stringName 
- The name of the Firewall Policy.
- Id string
- Resource ID.
- Identity
ManagedService Identity Args 
- The identity of the firewall policy.
- Insights
FirewallPolicy Insights Args 
- Insights on Firewall Policy.
- IntrusionDetection FirewallPolicy Intrusion Detection Args 
- The configuration for Intrusion detection.
- Location string
- Resource location.
- Sku
FirewallPolicy Sku Args 
- The Firewall Policy SKU.
- Snat
FirewallPolicy SNATArgs 
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- Sql
FirewallPolicy SQLArgs 
- SQL Settings definition.
- map[string]string
- Resource tags.
- ThreatIntel string | AzureMode Firewall Threat Intel Mode 
- The operation mode for Threat Intelligence.
- ThreatIntel FirewallWhitelist Policy Threat Intel Whitelist Args 
- ThreatIntel Whitelist for Firewall Policy.
- TransportSecurity FirewallPolicy Transport Security Args 
- TLS Configuration definition.
- resourceGroup StringName 
- The name of the resource group.
- basePolicy SubResource 
- The parent firewall policy from which rules are inherited.
- dnsSettings DnsSettings 
- DNS Proxy Settings definition.
- explicitProxy ExplicitProxy 
- Explicit Proxy Settings definition.
- firewallPolicy StringName 
- The name of the Firewall Policy.
- id String
- Resource ID.
- identity
ManagedService Identity 
- The identity of the firewall policy.
- insights
FirewallPolicy Insights 
- Insights on Firewall Policy.
- intrusionDetection FirewallPolicy Intrusion Detection 
- The configuration for Intrusion detection.
- location String
- Resource location.
- sku
FirewallPolicy Sku 
- The Firewall Policy SKU.
- snat
FirewallPolicy SNAT 
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- sql
FirewallPolicy SQL 
- SQL Settings definition.
- Map<String,String>
- Resource tags.
- threatIntel String | AzureMode Firewall Threat Intel Mode 
- The operation mode for Threat Intelligence.
- threatIntel FirewallWhitelist Policy Threat Intel Whitelist 
- ThreatIntel Whitelist for Firewall Policy.
- transportSecurity FirewallPolicy Transport Security 
- TLS Configuration definition.
- resourceGroup stringName 
- The name of the resource group.
- basePolicy SubResource 
- The parent firewall policy from which rules are inherited.
- dnsSettings DnsSettings 
- DNS Proxy Settings definition.
- explicitProxy ExplicitProxy 
- Explicit Proxy Settings definition.
- firewallPolicy stringName 
- The name of the Firewall Policy.
- id string
- Resource ID.
- identity
ManagedService Identity 
- The identity of the firewall policy.
- insights
FirewallPolicy Insights 
- Insights on Firewall Policy.
- intrusionDetection FirewallPolicy Intrusion Detection 
- The configuration for Intrusion detection.
- location string
- Resource location.
- sku
FirewallPolicy Sku 
- The Firewall Policy SKU.
- snat
FirewallPolicy SNAT 
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- sql
FirewallPolicy SQL 
- SQL Settings definition.
- {[key: string]: string}
- Resource tags.
- threatIntel string | AzureMode Firewall Threat Intel Mode 
- The operation mode for Threat Intelligence.
- threatIntel FirewallWhitelist Policy Threat Intel Whitelist 
- ThreatIntel Whitelist for Firewall Policy.
- transportSecurity FirewallPolicy Transport Security 
- TLS Configuration definition.
- resource_group_ strname 
- The name of the resource group.
- base_policy SubResource Args 
- The parent firewall policy from which rules are inherited.
- dns_settings DnsSettings Args 
- DNS Proxy Settings definition.
- explicit_proxy ExplicitProxy Args 
- Explicit Proxy Settings definition.
- firewall_policy_ strname 
- The name of the Firewall Policy.
- id str
- Resource ID.
- identity
ManagedService Identity Args 
- The identity of the firewall policy.
- insights
FirewallPolicy Insights Args 
- Insights on Firewall Policy.
- intrusion_detection FirewallPolicy Intrusion Detection Args 
- The configuration for Intrusion detection.
- location str
- Resource location.
- sku
FirewallPolicy Sku Args 
- The Firewall Policy SKU.
- snat
FirewallPolicy SNATArgs 
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- sql
FirewallPolicy SQLArgs 
- SQL Settings definition.
- Mapping[str, str]
- Resource tags.
- threat_intel_ str | Azuremode Firewall Threat Intel Mode 
- The operation mode for Threat Intelligence.
- threat_intel_ Firewallwhitelist Policy Threat Intel Whitelist Args 
- ThreatIntel Whitelist for Firewall Policy.
- transport_security FirewallPolicy Transport Security Args 
- TLS Configuration definition.
- resourceGroup StringName 
- The name of the resource group.
- basePolicy Property Map
- The parent firewall policy from which rules are inherited.
- dnsSettings Property Map
- DNS Proxy Settings definition.
- explicitProxy Property Map
- Explicit Proxy Settings definition.
- firewallPolicy StringName 
- The name of the Firewall Policy.
- id String
- Resource ID.
- identity Property Map
- The identity of the firewall policy.
- insights Property Map
- Insights on Firewall Policy.
- intrusionDetection Property Map
- The configuration for Intrusion detection.
- location String
- Resource location.
- sku Property Map
- The Firewall Policy SKU.
- snat Property Map
- The private IP addresses/IP ranges to which traffic will not be SNAT.
- sql Property Map
- SQL Settings definition.
- Map<String>
- Resource tags.
- threatIntel String | "Alert" | "Deny" | "Off"Mode 
- The operation mode for Threat Intelligence.
- threatIntel Property MapWhitelist 
- ThreatIntel Whitelist for Firewall Policy.
- transportSecurity Property Map
- TLS Configuration definition.
Outputs
All input properties are implicitly available as output properties. Additionally, the FirewallPolicy resource produces the following output properties:
- ChildPolicies List<Pulumi.Azure Native. Network. Outputs. Sub Resource Response> 
- List of references to Child Firewall Policies.
- Etag string
- A unique read-only string that changes whenever the resource is updated.
- Firewalls
List<Pulumi.Azure Native. Network. Outputs. Sub Resource Response> 
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Resource name.
- ProvisioningState string
- The provisioning state of the firewall policy resource.
- RuleCollection List<Pulumi.Groups Azure Native. Network. Outputs. Sub Resource Response> 
- List of references to FirewallPolicyRuleCollectionGroups.
- Type string
- Resource type.
- ChildPolicies []SubResource Response 
- List of references to Child Firewall Policies.
- Etag string
- A unique read-only string that changes whenever the resource is updated.
- Firewalls
[]SubResource Response 
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Resource name.
- ProvisioningState string
- The provisioning state of the firewall policy resource.
- RuleCollection []SubGroups Resource Response 
- List of references to FirewallPolicyRuleCollectionGroups.
- Type string
- Resource type.
- childPolicies List<SubResource Response> 
- List of references to Child Firewall Policies.
- etag String
- A unique read-only string that changes whenever the resource is updated.
- firewalls
List<SubResource Response> 
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Resource name.
- provisioningState String
- The provisioning state of the firewall policy resource.
- ruleCollection List<SubGroups Resource Response> 
- List of references to FirewallPolicyRuleCollectionGroups.
- type String
- Resource type.
- childPolicies SubResource Response[] 
- List of references to Child Firewall Policies.
- etag string
- A unique read-only string that changes whenever the resource is updated.
- firewalls
SubResource Response[] 
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- Resource name.
- provisioningState string
- The provisioning state of the firewall policy resource.
- ruleCollection SubGroups Resource Response[] 
- List of references to FirewallPolicyRuleCollectionGroups.
- type string
- Resource type.
- child_policies Sequence[SubResource Response] 
- List of references to Child Firewall Policies.
- etag str
- A unique read-only string that changes whenever the resource is updated.
- firewalls
Sequence[SubResource Response] 
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- Resource name.
- provisioning_state str
- The provisioning state of the firewall policy resource.
- rule_collection_ Sequence[Subgroups Resource Response] 
- List of references to FirewallPolicyRuleCollectionGroups.
- type str
- Resource type.
- childPolicies List<Property Map>
- List of references to Child Firewall Policies.
- etag String
- A unique read-only string that changes whenever the resource is updated.
- firewalls List<Property Map>
- List of references to Azure Firewalls that this Firewall Policy is associated with.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Resource name.
- provisioningState String
- The provisioning state of the firewall policy resource.
- ruleCollection List<Property Map>Groups 
- List of references to FirewallPolicyRuleCollectionGroups.
- type String
- Resource type.
Supporting Types
AutoLearnPrivateRangesMode, AutoLearnPrivateRangesModeArgs          
- Enabled
- Enabled
- Disabled
- Disabled
- AutoLearn Private Ranges Mode Enabled 
- Enabled
- AutoLearn Private Ranges Mode Disabled 
- Disabled
- Enabled
- Enabled
- Disabled
- Disabled
- Enabled
- Enabled
- Disabled
- Disabled
- ENABLED
- Enabled
- DISABLED
- Disabled
- "Enabled"
- Enabled
- "Disabled"
- Disabled
AzureFirewallThreatIntelMode, AzureFirewallThreatIntelModeArgs          
- Alert
- Alert
- Deny
- Deny
- Off
- Off
- AzureFirewall Threat Intel Mode Alert 
- Alert
- AzureFirewall Threat Intel Mode Deny 
- Deny
- AzureFirewall Threat Intel Mode Off 
- Off
- Alert
- Alert
- Deny
- Deny
- Off
- Off
- Alert
- Alert
- Deny
- Deny
- Off
- Off
- ALERT
- Alert
- DENY
- Deny
- OFF
- Off
- "Alert"
- Alert
- "Deny"
- Deny
- "Off"
- Off
DnsSettings, DnsSettingsArgs    
- EnableProxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- RequireProxy boolFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- Servers List<string>
- List of Custom DNS Servers.
- EnableProxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- RequireProxy boolFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- Servers []string
- List of Custom DNS Servers.
- enableProxy Boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy BooleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers List<String>
- List of Custom DNS Servers.
- enableProxy boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy booleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers string[]
- List of Custom DNS Servers.
- enable_proxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- require_proxy_ boolfor_ network_ rules 
- FQDNs in Network Rules are supported when set to true.
- servers Sequence[str]
- List of Custom DNS Servers.
- enableProxy Boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy BooleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers List<String>
- List of Custom DNS Servers.
DnsSettingsResponse, DnsSettingsResponseArgs      
- EnableProxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- RequireProxy boolFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- Servers List<string>
- List of Custom DNS Servers.
- EnableProxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- RequireProxy boolFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- Servers []string
- List of Custom DNS Servers.
- enableProxy Boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy BooleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers List<String>
- List of Custom DNS Servers.
- enableProxy boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy booleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers string[]
- List of Custom DNS Servers.
- enable_proxy bool
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- require_proxy_ boolfor_ network_ rules 
- FQDNs in Network Rules are supported when set to true.
- servers Sequence[str]
- List of Custom DNS Servers.
- enableProxy Boolean
- Enable DNS Proxy on Firewalls attached to the Firewall Policy.
- requireProxy BooleanFor Network Rules 
- FQDNs in Network Rules are supported when set to true.
- servers List<String>
- List of Custom DNS Servers.
ExplicitProxy, ExplicitProxyArgs    
- EnableExplicit boolProxy 
- When set to true, explicit proxy mode is enabled.
- EnablePac boolFile 
- When set to true, pac file port and url needs to be provided.
- HttpPort int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- HttpsPort int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- PacFile string
- SAS URL for PAC file.
- PacFile intPort 
- Port number for firewall to serve PAC file.
- EnableExplicit boolProxy 
- When set to true, explicit proxy mode is enabled.
- EnablePac boolFile 
- When set to true, pac file port and url needs to be provided.
- HttpPort int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- HttpsPort int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- PacFile string
- SAS URL for PAC file.
- PacFile intPort 
- Port number for firewall to serve PAC file.
- enableExplicit BooleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac BooleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort Integer
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort Integer
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile String
- SAS URL for PAC file.
- pacFile IntegerPort 
- Port number for firewall to serve PAC file.
- enableExplicit booleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac booleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort number
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort number
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile string
- SAS URL for PAC file.
- pacFile numberPort 
- Port number for firewall to serve PAC file.
- enable_explicit_ boolproxy 
- When set to true, explicit proxy mode is enabled.
- enable_pac_ boolfile 
- When set to true, pac file port and url needs to be provided.
- http_port int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- https_port int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pac_file str
- SAS URL for PAC file.
- pac_file_ intport 
- Port number for firewall to serve PAC file.
- enableExplicit BooleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac BooleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort Number
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort Number
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile String
- SAS URL for PAC file.
- pacFile NumberPort 
- Port number for firewall to serve PAC file.
ExplicitProxyResponse, ExplicitProxyResponseArgs      
- EnableExplicit boolProxy 
- When set to true, explicit proxy mode is enabled.
- EnablePac boolFile 
- When set to true, pac file port and url needs to be provided.
- HttpPort int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- HttpsPort int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- PacFile string
- SAS URL for PAC file.
- PacFile intPort 
- Port number for firewall to serve PAC file.
- EnableExplicit boolProxy 
- When set to true, explicit proxy mode is enabled.
- EnablePac boolFile 
- When set to true, pac file port and url needs to be provided.
- HttpPort int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- HttpsPort int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- PacFile string
- SAS URL for PAC file.
- PacFile intPort 
- Port number for firewall to serve PAC file.
- enableExplicit BooleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac BooleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort Integer
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort Integer
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile String
- SAS URL for PAC file.
- pacFile IntegerPort 
- Port number for firewall to serve PAC file.
- enableExplicit booleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac booleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort number
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort number
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile string
- SAS URL for PAC file.
- pacFile numberPort 
- Port number for firewall to serve PAC file.
- enable_explicit_ boolproxy 
- When set to true, explicit proxy mode is enabled.
- enable_pac_ boolfile 
- When set to true, pac file port and url needs to be provided.
- http_port int
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- https_port int
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pac_file str
- SAS URL for PAC file.
- pac_file_ intport 
- Port number for firewall to serve PAC file.
- enableExplicit BooleanProxy 
- When set to true, explicit proxy mode is enabled.
- enablePac BooleanFile 
- When set to true, pac file port and url needs to be provided.
- httpPort Number
- Port number for explicit proxy http protocol, cannot be greater than 64000.
- httpsPort Number
- Port number for explicit proxy https protocol, cannot be greater than 64000.
- pacFile String
- SAS URL for PAC file.
- pacFile NumberPort 
- Port number for firewall to serve PAC file.
FirewallPolicyCertificateAuthority, FirewallPolicyCertificateAuthorityArgs        
- KeyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- Name string
- Name of the CA certificate.
- KeyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- Name string
- Name of the CA certificate.
- keyVault StringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name String
- Name of the CA certificate.
- keyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name string
- Name of the CA certificate.
- key_vault_ strsecret_ id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name str
- Name of the CA certificate.
- keyVault StringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name String
- Name of the CA certificate.
FirewallPolicyCertificateAuthorityResponse, FirewallPolicyCertificateAuthorityResponseArgs          
- KeyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- Name string
- Name of the CA certificate.
- KeyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- Name string
- Name of the CA certificate.
- keyVault StringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name String
- Name of the CA certificate.
- keyVault stringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name string
- Name of the CA certificate.
- key_vault_ strsecret_ id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name str
- Name of the CA certificate.
- keyVault StringSecret Id 
- Secret Id of (base-64 encoded unencrypted pfx) 'Secret' or 'Certificate' object stored in KeyVault.
- name String
- Name of the CA certificate.
FirewallPolicyInsights, FirewallPolicyInsightsArgs      
- IsEnabled bool
- A flag to indicate if the insights are enabled on the policy.
- LogAnalytics Pulumi.Resources Azure Native. Network. Inputs. Firewall Policy Log Analytics Resources 
- Workspaces needed to configure the Firewall Policy Insights.
- RetentionDays int
- Number of days the insights should be enabled on the policy.
- IsEnabled bool
- A flag to indicate if the insights are enabled on the policy.
- LogAnalytics FirewallResources Policy Log Analytics Resources 
- Workspaces needed to configure the Firewall Policy Insights.
- RetentionDays int
- Number of days the insights should be enabled on the policy.
- isEnabled Boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics FirewallResources Policy Log Analytics Resources 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays Integer
- Number of days the insights should be enabled on the policy.
- isEnabled boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics FirewallResources Policy Log Analytics Resources 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays number
- Number of days the insights should be enabled on the policy.
- is_enabled bool
- A flag to indicate if the insights are enabled on the policy.
- log_analytics_ Firewallresources Policy Log Analytics Resources 
- Workspaces needed to configure the Firewall Policy Insights.
- retention_days int
- Number of days the insights should be enabled on the policy.
- isEnabled Boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics Property MapResources 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays Number
- Number of days the insights should be enabled on the policy.
FirewallPolicyInsightsResponse, FirewallPolicyInsightsResponseArgs        
- IsEnabled bool
- A flag to indicate if the insights are enabled on the policy.
- LogAnalytics Pulumi.Resources Azure Native. Network. Inputs. Firewall Policy Log Analytics Resources Response 
- Workspaces needed to configure the Firewall Policy Insights.
- RetentionDays int
- Number of days the insights should be enabled on the policy.
- IsEnabled bool
- A flag to indicate if the insights are enabled on the policy.
- LogAnalytics FirewallResources Policy Log Analytics Resources Response 
- Workspaces needed to configure the Firewall Policy Insights.
- RetentionDays int
- Number of days the insights should be enabled on the policy.
- isEnabled Boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics FirewallResources Policy Log Analytics Resources Response 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays Integer
- Number of days the insights should be enabled on the policy.
- isEnabled boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics FirewallResources Policy Log Analytics Resources Response 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays number
- Number of days the insights should be enabled on the policy.
- is_enabled bool
- A flag to indicate if the insights are enabled on the policy.
- log_analytics_ Firewallresources Policy Log Analytics Resources Response 
- Workspaces needed to configure the Firewall Policy Insights.
- retention_days int
- Number of days the insights should be enabled on the policy.
- isEnabled Boolean
- A flag to indicate if the insights are enabled on the policy.
- logAnalytics Property MapResources 
- Workspaces needed to configure the Firewall Policy Insights.
- retentionDays Number
- Number of days the insights should be enabled on the policy.
FirewallPolicyIntrusionDetection, FirewallPolicyIntrusionDetectionArgs        
- Configuration
Pulumi.Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Configuration 
- Intrusion detection configuration properties.
- Mode
string | Pulumi.Azure Native. Network. Firewall Policy Intrusion Detection State Type 
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- Profile
string | Pulumi.Azure Native. Network. Firewall Policy Intrusion Detection Profile Type 
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- Configuration
FirewallPolicy Intrusion Detection Configuration 
- Intrusion detection configuration properties.
- Mode
string | FirewallPolicy Intrusion Detection State Type 
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- Profile
string | FirewallPolicy Intrusion Detection Profile Type 
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration 
- Intrusion detection configuration properties.
- mode
String | FirewallPolicy Intrusion Detection State Type 
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile
String | FirewallPolicy Intrusion Detection Profile Type 
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration 
- Intrusion detection configuration properties.
- mode
string | FirewallPolicy Intrusion Detection State Type 
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile
string | FirewallPolicy Intrusion Detection Profile Type 
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration 
- Intrusion detection configuration properties.
- mode
str | FirewallPolicy Intrusion Detection State Type 
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile
str | FirewallPolicy Intrusion Detection Profile Type 
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration Property Map
- Intrusion detection configuration properties.
- mode String | "Off" | "Alert" | "Deny"
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile String | "Basic" | "Standard" | "Advanced" | "Extended"
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
FirewallPolicyIntrusionDetectionBypassTrafficSpecifications, FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsArgs              
- Description string
- Description of the bypass traffic rule.
- DestinationAddresses List<string>
- List of destination IP addresses or ranges for this rule.
- DestinationIp List<string>Groups 
- List of destination IpGroups for this rule.
- DestinationPorts List<string>
- List of destination ports or ranges.
- Name string
- Name of the bypass traffic rule.
- Protocol
string | Pulumi.Azure Native. Network. Firewall Policy Intrusion Detection Protocol 
- The rule bypass protocol.
- SourceAddresses List<string>
- List of source IP addresses or ranges for this rule.
- SourceIp List<string>Groups 
- List of source IpGroups for this rule.
- Description string
- Description of the bypass traffic rule.
- DestinationAddresses []string
- List of destination IP addresses or ranges for this rule.
- DestinationIp []stringGroups 
- List of destination IpGroups for this rule.
- DestinationPorts []string
- List of destination ports or ranges.
- Name string
- Name of the bypass traffic rule.
- Protocol
string | FirewallPolicy Intrusion Detection Protocol 
- The rule bypass protocol.
- SourceAddresses []string
- List of source IP addresses or ranges for this rule.
- SourceIp []stringGroups 
- List of source IpGroups for this rule.
- description String
- Description of the bypass traffic rule.
- destinationAddresses List<String>
- List of destination IP addresses or ranges for this rule.
- destinationIp List<String>Groups 
- List of destination IpGroups for this rule.
- destinationPorts List<String>
- List of destination ports or ranges.
- name String
- Name of the bypass traffic rule.
- protocol
String | FirewallPolicy Intrusion Detection Protocol 
- The rule bypass protocol.
- sourceAddresses List<String>
- List of source IP addresses or ranges for this rule.
- sourceIp List<String>Groups 
- List of source IpGroups for this rule.
- description string
- Description of the bypass traffic rule.
- destinationAddresses string[]
- List of destination IP addresses or ranges for this rule.
- destinationIp string[]Groups 
- List of destination IpGroups for this rule.
- destinationPorts string[]
- List of destination ports or ranges.
- name string
- Name of the bypass traffic rule.
- protocol
string | FirewallPolicy Intrusion Detection Protocol 
- The rule bypass protocol.
- sourceAddresses string[]
- List of source IP addresses or ranges for this rule.
- sourceIp string[]Groups 
- List of source IpGroups for this rule.
- description str
- Description of the bypass traffic rule.
- destination_addresses Sequence[str]
- List of destination IP addresses or ranges for this rule.
- destination_ip_ Sequence[str]groups 
- List of destination IpGroups for this rule.
- destination_ports Sequence[str]
- List of destination ports or ranges.
- name str
- Name of the bypass traffic rule.
- protocol
str | FirewallPolicy Intrusion Detection Protocol 
- The rule bypass protocol.
- source_addresses Sequence[str]
- List of source IP addresses or ranges for this rule.
- source_ip_ Sequence[str]groups 
- List of source IpGroups for this rule.
- description String
- Description of the bypass traffic rule.
- destinationAddresses List<String>
- List of destination IP addresses or ranges for this rule.
- destinationIp List<String>Groups 
- List of destination IpGroups for this rule.
- destinationPorts List<String>
- List of destination ports or ranges.
- name String
- Name of the bypass traffic rule.
- protocol String | "TCP" | "UDP" | "ICMP" | "ANY"
- The rule bypass protocol.
- sourceAddresses List<String>
- List of source IP addresses or ranges for this rule.
- sourceIp List<String>Groups 
- List of source IpGroups for this rule.
FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsResponse, FirewallPolicyIntrusionDetectionBypassTrafficSpecificationsResponseArgs                
- Description string
- Description of the bypass traffic rule.
- DestinationAddresses List<string>
- List of destination IP addresses or ranges for this rule.
- DestinationIp List<string>Groups 
- List of destination IpGroups for this rule.
- DestinationPorts List<string>
- List of destination ports or ranges.
- Name string
- Name of the bypass traffic rule.
- Protocol string
- The rule bypass protocol.
- SourceAddresses List<string>
- List of source IP addresses or ranges for this rule.
- SourceIp List<string>Groups 
- List of source IpGroups for this rule.
- Description string
- Description of the bypass traffic rule.
- DestinationAddresses []string
- List of destination IP addresses or ranges for this rule.
- DestinationIp []stringGroups 
- List of destination IpGroups for this rule.
- DestinationPorts []string
- List of destination ports or ranges.
- Name string
- Name of the bypass traffic rule.
- Protocol string
- The rule bypass protocol.
- SourceAddresses []string
- List of source IP addresses or ranges for this rule.
- SourceIp []stringGroups 
- List of source IpGroups for this rule.
- description String
- Description of the bypass traffic rule.
- destinationAddresses List<String>
- List of destination IP addresses or ranges for this rule.
- destinationIp List<String>Groups 
- List of destination IpGroups for this rule.
- destinationPorts List<String>
- List of destination ports or ranges.
- name String
- Name of the bypass traffic rule.
- protocol String
- The rule bypass protocol.
- sourceAddresses List<String>
- List of source IP addresses or ranges for this rule.
- sourceIp List<String>Groups 
- List of source IpGroups for this rule.
- description string
- Description of the bypass traffic rule.
- destinationAddresses string[]
- List of destination IP addresses or ranges for this rule.
- destinationIp string[]Groups 
- List of destination IpGroups for this rule.
- destinationPorts string[]
- List of destination ports or ranges.
- name string
- Name of the bypass traffic rule.
- protocol string
- The rule bypass protocol.
- sourceAddresses string[]
- List of source IP addresses or ranges for this rule.
- sourceIp string[]Groups 
- List of source IpGroups for this rule.
- description str
- Description of the bypass traffic rule.
- destination_addresses Sequence[str]
- List of destination IP addresses or ranges for this rule.
- destination_ip_ Sequence[str]groups 
- List of destination IpGroups for this rule.
- destination_ports Sequence[str]
- List of destination ports or ranges.
- name str
- Name of the bypass traffic rule.
- protocol str
- The rule bypass protocol.
- source_addresses Sequence[str]
- List of source IP addresses or ranges for this rule.
- source_ip_ Sequence[str]groups 
- List of source IpGroups for this rule.
- description String
- Description of the bypass traffic rule.
- destinationAddresses List<String>
- List of destination IP addresses or ranges for this rule.
- destinationIp List<String>Groups 
- List of destination IpGroups for this rule.
- destinationPorts List<String>
- List of destination ports or ranges.
- name String
- Name of the bypass traffic rule.
- protocol String
- The rule bypass protocol.
- sourceAddresses List<String>
- List of source IP addresses or ranges for this rule.
- sourceIp List<String>Groups 
- List of source IpGroups for this rule.
FirewallPolicyIntrusionDetectionConfiguration, FirewallPolicyIntrusionDetectionConfigurationArgs          
- BypassTraffic List<Pulumi.Settings Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Bypass Traffic Specifications> 
- List of rules for traffic to bypass.
- PrivateRanges List<string>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- SignatureOverrides List<Pulumi.Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Signature Specification> 
- List of specific signatures states.
- BypassTraffic []FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications 
- List of rules for traffic to bypass.
- PrivateRanges []string
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- SignatureOverrides []FirewallPolicy Intrusion Detection Signature Specification 
- List of specific signatures states.
- bypassTraffic List<FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications> 
- List of rules for traffic to bypass.
- privateRanges List<String>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides List<FirewallPolicy Intrusion Detection Signature Specification> 
- List of specific signatures states.
- bypassTraffic FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications[] 
- List of rules for traffic to bypass.
- privateRanges string[]
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides FirewallPolicy Intrusion Detection Signature Specification[] 
- List of specific signatures states.
- bypass_traffic_ Sequence[Firewallsettings Policy Intrusion Detection Bypass Traffic Specifications] 
- List of rules for traffic to bypass.
- private_ranges Sequence[str]
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signature_overrides Sequence[FirewallPolicy Intrusion Detection Signature Specification] 
- List of specific signatures states.
- bypassTraffic List<Property Map>Settings 
- List of rules for traffic to bypass.
- privateRanges List<String>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides List<Property Map>
- List of specific signatures states.
FirewallPolicyIntrusionDetectionConfigurationResponse, FirewallPolicyIntrusionDetectionConfigurationResponseArgs            
- BypassTraffic List<Pulumi.Settings Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Bypass Traffic Specifications Response> 
- List of rules for traffic to bypass.
- PrivateRanges List<string>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- SignatureOverrides List<Pulumi.Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Signature Specification Response> 
- List of specific signatures states.
- BypassTraffic []FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications Response 
- List of rules for traffic to bypass.
- PrivateRanges []string
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- SignatureOverrides []FirewallPolicy Intrusion Detection Signature Specification Response 
- List of specific signatures states.
- bypassTraffic List<FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications Response> 
- List of rules for traffic to bypass.
- privateRanges List<String>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides List<FirewallPolicy Intrusion Detection Signature Specification Response> 
- List of specific signatures states.
- bypassTraffic FirewallSettings Policy Intrusion Detection Bypass Traffic Specifications Response[] 
- List of rules for traffic to bypass.
- privateRanges string[]
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides FirewallPolicy Intrusion Detection Signature Specification Response[] 
- List of specific signatures states.
- bypass_traffic_ Sequence[Firewallsettings Policy Intrusion Detection Bypass Traffic Specifications Response] 
- List of rules for traffic to bypass.
- private_ranges Sequence[str]
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signature_overrides Sequence[FirewallPolicy Intrusion Detection Signature Specification Response] 
- List of specific signatures states.
- bypassTraffic List<Property Map>Settings 
- List of rules for traffic to bypass.
- privateRanges List<String>
- IDPS Private IP address ranges are used to identify traffic direction (i.e. inbound, outbound, etc.). By default, only ranges defined by IANA RFC 1918 are considered private IP addresses. To modify default ranges, specify your Private IP address ranges with this property
- signatureOverrides List<Property Map>
- List of specific signatures states.
FirewallPolicyIntrusionDetectionProfileType, FirewallPolicyIntrusionDetectionProfileTypeArgs            
- Basic
- Basic
- Standard
- Standard
- Advanced
- Advanced
- Extended
- Extended
- FirewallPolicy Intrusion Detection Profile Type Basic 
- Basic
- FirewallPolicy Intrusion Detection Profile Type Standard 
- Standard
- FirewallPolicy Intrusion Detection Profile Type Advanced 
- Advanced
- FirewallPolicy Intrusion Detection Profile Type Extended 
- Extended
- Basic
- Basic
- Standard
- Standard
- Advanced
- Advanced
- Extended
- Extended
- Basic
- Basic
- Standard
- Standard
- Advanced
- Advanced
- Extended
- Extended
- BASIC
- Basic
- STANDARD
- Standard
- ADVANCED
- Advanced
- EXTENDED
- Extended
- "Basic"
- Basic
- "Standard"
- Standard
- "Advanced"
- Advanced
- "Extended"
- Extended
FirewallPolicyIntrusionDetectionProtocol, FirewallPolicyIntrusionDetectionProtocolArgs          
- TCP
- TCP
- UDP
- UDP
- ICMP
- ICMP
- ANY
- ANY
- FirewallPolicy Intrusion Detection Protocol TCP 
- TCP
- FirewallPolicy Intrusion Detection Protocol UDP 
- UDP
- FirewallPolicy Intrusion Detection Protocol ICMP 
- ICMP
- FirewallPolicy Intrusion Detection Protocol ANY 
- ANY
- TCP
- TCP
- UDP
- UDP
- ICMP
- ICMP
- ANY
- ANY
- TCP
- TCP
- UDP
- UDP
- ICMP
- ICMP
- ANY
- ANY
- TCP
- TCP
- UDP
- UDP
- ICMP
- ICMP
- ANY
- ANY
- "TCP"
- TCP
- "UDP"
- UDP
- "ICMP"
- ICMP
- "ANY"
- ANY
FirewallPolicyIntrusionDetectionResponse, FirewallPolicyIntrusionDetectionResponseArgs          
- Configuration
Pulumi.Azure Native. Network. Inputs. Firewall Policy Intrusion Detection Configuration Response 
- Intrusion detection configuration properties.
- Mode string
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- Profile string
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- Configuration
FirewallPolicy Intrusion Detection Configuration Response 
- Intrusion detection configuration properties.
- Mode string
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- Profile string
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration Response 
- Intrusion detection configuration properties.
- mode String
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile String
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration Response 
- Intrusion detection configuration properties.
- mode string
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile string
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration
FirewallPolicy Intrusion Detection Configuration Response 
- Intrusion detection configuration properties.
- mode str
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile str
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
- configuration Property Map
- Intrusion detection configuration properties.
- mode String
- Intrusion detection general state. When attached to a parent policy, the firewall's effective IDPS mode is the stricter mode of the two.
- profile String
- IDPS profile name. When attached to a parent policy, the firewall's effective profile is the profile name of the parent policy.
FirewallPolicyIntrusionDetectionSignatureSpecification, FirewallPolicyIntrusionDetectionSignatureSpecificationArgs            
- Id string
- Signature id.
- Mode
string | Pulumi.Azure Native. Network. Firewall Policy Intrusion Detection State Type 
- The signature state.
- Id string
- Signature id.
- Mode
string | FirewallPolicy Intrusion Detection State Type 
- The signature state.
- id String
- Signature id.
- mode
String | FirewallPolicy Intrusion Detection State Type 
- The signature state.
- id string
- Signature id.
- mode
string | FirewallPolicy Intrusion Detection State Type 
- The signature state.
- id str
- Signature id.
- mode
str | FirewallPolicy Intrusion Detection State Type 
- The signature state.
- id String
- Signature id.
- mode String | "Off" | "Alert" | "Deny"
- The signature state.
FirewallPolicyIntrusionDetectionSignatureSpecificationResponse, FirewallPolicyIntrusionDetectionSignatureSpecificationResponseArgs              
FirewallPolicyIntrusionDetectionStateType, FirewallPolicyIntrusionDetectionStateTypeArgs            
- Off
- Off
- Alert
- Alert
- Deny
- Deny
- FirewallPolicy Intrusion Detection State Type Off 
- Off
- FirewallPolicy Intrusion Detection State Type Alert 
- Alert
- FirewallPolicy Intrusion Detection State Type Deny 
- Deny
- Off
- Off
- Alert
- Alert
- Deny
- Deny
- Off
- Off
- Alert
- Alert
- Deny
- Deny
- OFF
- Off
- ALERT
- Alert
- DENY
- Deny
- "Off"
- Off
- "Alert"
- Alert
- "Deny"
- Deny
FirewallPolicyLogAnalyticsResources, FirewallPolicyLogAnalyticsResourcesArgs          
- DefaultWorkspace Pulumi.Id Azure Native. Network. Inputs. Sub Resource 
- The default workspace Id for Firewall Policy Insights.
- Workspaces
List<Pulumi.Azure Native. Network. Inputs. Firewall Policy Log Analytics Workspace> 
- List of workspaces for Firewall Policy Insights.
- DefaultWorkspace SubId Resource 
- The default workspace Id for Firewall Policy Insights.
- Workspaces
[]FirewallPolicy Log Analytics Workspace 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace SubId Resource 
- The default workspace Id for Firewall Policy Insights.
- workspaces
List<FirewallPolicy Log Analytics Workspace> 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace SubId Resource 
- The default workspace Id for Firewall Policy Insights.
- workspaces
FirewallPolicy Log Analytics Workspace[] 
- List of workspaces for Firewall Policy Insights.
- default_workspace_ Subid Resource 
- The default workspace Id for Firewall Policy Insights.
- workspaces
Sequence[FirewallPolicy Log Analytics Workspace] 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace Property MapId 
- The default workspace Id for Firewall Policy Insights.
- workspaces List<Property Map>
- List of workspaces for Firewall Policy Insights.
FirewallPolicyLogAnalyticsResourcesResponse, FirewallPolicyLogAnalyticsResourcesResponseArgs            
- DefaultWorkspace Pulumi.Id Azure Native. Network. Inputs. Sub Resource Response 
- The default workspace Id for Firewall Policy Insights.
- Workspaces
List<Pulumi.Azure Native. Network. Inputs. Firewall Policy Log Analytics Workspace Response> 
- List of workspaces for Firewall Policy Insights.
- DefaultWorkspace SubId Resource Response 
- The default workspace Id for Firewall Policy Insights.
- Workspaces
[]FirewallPolicy Log Analytics Workspace Response 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace SubId Resource Response 
- The default workspace Id for Firewall Policy Insights.
- workspaces
List<FirewallPolicy Log Analytics Workspace Response> 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace SubId Resource Response 
- The default workspace Id for Firewall Policy Insights.
- workspaces
FirewallPolicy Log Analytics Workspace Response[] 
- List of workspaces for Firewall Policy Insights.
- default_workspace_ Subid Resource Response 
- The default workspace Id for Firewall Policy Insights.
- workspaces
Sequence[FirewallPolicy Log Analytics Workspace Response] 
- List of workspaces for Firewall Policy Insights.
- defaultWorkspace Property MapId 
- The default workspace Id for Firewall Policy Insights.
- workspaces List<Property Map>
- List of workspaces for Firewall Policy Insights.
FirewallPolicyLogAnalyticsWorkspace, FirewallPolicyLogAnalyticsWorkspaceArgs          
- Region string
- Region to configure the Workspace.
- WorkspaceId Pulumi.Azure Native. Network. Inputs. Sub Resource 
- The workspace Id for Firewall Policy Insights.
- Region string
- Region to configure the Workspace.
- WorkspaceId SubResource 
- The workspace Id for Firewall Policy Insights.
- region String
- Region to configure the Workspace.
- workspaceId SubResource 
- The workspace Id for Firewall Policy Insights.
- region string
- Region to configure the Workspace.
- workspaceId SubResource 
- The workspace Id for Firewall Policy Insights.
- region str
- Region to configure the Workspace.
- workspace_id SubResource 
- The workspace Id for Firewall Policy Insights.
- region String
- Region to configure the Workspace.
- workspaceId Property Map
- The workspace Id for Firewall Policy Insights.
FirewallPolicyLogAnalyticsWorkspaceResponse, FirewallPolicyLogAnalyticsWorkspaceResponseArgs            
- Region string
- Region to configure the Workspace.
- WorkspaceId Pulumi.Azure Native. Network. Inputs. Sub Resource Response 
- The workspace Id for Firewall Policy Insights.
- Region string
- Region to configure the Workspace.
- WorkspaceId SubResource Response 
- The workspace Id for Firewall Policy Insights.
- region String
- Region to configure the Workspace.
- workspaceId SubResource Response 
- The workspace Id for Firewall Policy Insights.
- region string
- Region to configure the Workspace.
- workspaceId SubResource Response 
- The workspace Id for Firewall Policy Insights.
- region str
- Region to configure the Workspace.
- workspace_id SubResource Response 
- The workspace Id for Firewall Policy Insights.
- region String
- Region to configure the Workspace.
- workspaceId Property Map
- The workspace Id for Firewall Policy Insights.
FirewallPolicySNAT, FirewallPolicySNATArgs      
- AutoLearn string | Pulumi.Private Ranges Azure Native. Network. Auto Learn Private Ranges Mode 
- The operation mode for automatically learning private ranges to not be SNAT
- PrivateRanges List<string>
- List of private IP addresses/IP address ranges to not be SNAT.
- AutoLearn string | AutoPrivate Ranges Learn Private Ranges Mode 
- The operation mode for automatically learning private ranges to not be SNAT
- PrivateRanges []string
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn String | AutoPrivate Ranges Learn Private Ranges Mode 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges List<String>
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn string | AutoPrivate Ranges Learn Private Ranges Mode 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges string[]
- List of private IP addresses/IP address ranges to not be SNAT.
- auto_learn_ str | Autoprivate_ ranges Learn Private Ranges Mode 
- The operation mode for automatically learning private ranges to not be SNAT
- private_ranges Sequence[str]
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn String | "Enabled" | "Disabled"Private Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges List<String>
- List of private IP addresses/IP address ranges to not be SNAT.
FirewallPolicySNATResponse, FirewallPolicySNATResponseArgs      
- AutoLearn stringPrivate Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- PrivateRanges List<string>
- List of private IP addresses/IP address ranges to not be SNAT.
- AutoLearn stringPrivate Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- PrivateRanges []string
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn StringPrivate Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges List<String>
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn stringPrivate Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges string[]
- List of private IP addresses/IP address ranges to not be SNAT.
- auto_learn_ strprivate_ ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- private_ranges Sequence[str]
- List of private IP addresses/IP address ranges to not be SNAT.
- autoLearn StringPrivate Ranges 
- The operation mode for automatically learning private ranges to not be SNAT
- privateRanges List<String>
- List of private IP addresses/IP address ranges to not be SNAT.
FirewallPolicySQL, FirewallPolicySQLArgs      
- AllowSql boolRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- AllowSql boolRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql BooleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql booleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allow_sql_ boolredirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql BooleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
FirewallPolicySQLResponse, FirewallPolicySQLResponseArgs      
- AllowSql boolRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- AllowSql boolRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql BooleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql booleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allow_sql_ boolredirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
- allowSql BooleanRedirect 
- A flag to indicate if SQL Redirect traffic filtering is enabled. Turning on the flag requires no rule using port 11000-11999.
FirewallPolicySku, FirewallPolicySkuArgs      
- Tier
string | Pulumi.Azure Native. Network. Firewall Policy Sku Tier 
- Tier of Firewall Policy.
- Tier
string | FirewallPolicy Sku Tier 
- Tier of Firewall Policy.
- tier
String | FirewallPolicy Sku Tier 
- Tier of Firewall Policy.
- tier
string | FirewallPolicy Sku Tier 
- Tier of Firewall Policy.
- tier
str | FirewallPolicy Sku Tier 
- Tier of Firewall Policy.
- tier String | "Standard" | "Premium" | "Basic"
- Tier of Firewall Policy.
FirewallPolicySkuResponse, FirewallPolicySkuResponseArgs        
- Tier string
- Tier of Firewall Policy.
- Tier string
- Tier of Firewall Policy.
- tier String
- Tier of Firewall Policy.
- tier string
- Tier of Firewall Policy.
- tier str
- Tier of Firewall Policy.
- tier String
- Tier of Firewall Policy.
FirewallPolicySkuTier, FirewallPolicySkuTierArgs        
- Standard
- Standard
- Premium
- Premium
- Basic
- Basic
- FirewallPolicy Sku Tier Standard 
- Standard
- FirewallPolicy Sku Tier Premium 
- Premium
- FirewallPolicy Sku Tier Basic 
- Basic
- Standard
- Standard
- Premium
- Premium
- Basic
- Basic
- Standard
- Standard
- Premium
- Premium
- Basic
- Basic
- STANDARD
- Standard
- PREMIUM
- Premium
- BASIC
- Basic
- "Standard"
- Standard
- "Premium"
- Premium
- "Basic"
- Basic
FirewallPolicyThreatIntelWhitelist, FirewallPolicyThreatIntelWhitelistArgs          
- Fqdns List<string>
- List of FQDNs for the ThreatIntel Whitelist.
- IpAddresses List<string>
- List of IP addresses for the ThreatIntel Whitelist.
- Fqdns []string
- List of FQDNs for the ThreatIntel Whitelist.
- IpAddresses []string
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns List<String>
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses List<String>
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns string[]
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses string[]
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns Sequence[str]
- List of FQDNs for the ThreatIntel Whitelist.
- ip_addresses Sequence[str]
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns List<String>
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses List<String>
- List of IP addresses for the ThreatIntel Whitelist.
FirewallPolicyThreatIntelWhitelistResponse, FirewallPolicyThreatIntelWhitelistResponseArgs            
- Fqdns List<string>
- List of FQDNs for the ThreatIntel Whitelist.
- IpAddresses List<string>
- List of IP addresses for the ThreatIntel Whitelist.
- Fqdns []string
- List of FQDNs for the ThreatIntel Whitelist.
- IpAddresses []string
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns List<String>
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses List<String>
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns string[]
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses string[]
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns Sequence[str]
- List of FQDNs for the ThreatIntel Whitelist.
- ip_addresses Sequence[str]
- List of IP addresses for the ThreatIntel Whitelist.
- fqdns List<String>
- List of FQDNs for the ThreatIntel Whitelist.
- ipAddresses List<String>
- List of IP addresses for the ThreatIntel Whitelist.
FirewallPolicyTransportSecurity, FirewallPolicyTransportSecurityArgs        
- 
Pulumi.Azure Native. Network. Inputs. Firewall Policy Certificate Authority 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority 
- The CA used for intermediate CA generation.
- Property Map
- The CA used for intermediate CA generation.
FirewallPolicyTransportSecurityResponse, FirewallPolicyTransportSecurityResponseArgs          
- 
Pulumi.Azure Native. Network. Inputs. Firewall Policy Certificate Authority Response 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority Response 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority Response 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority Response 
- The CA used for intermediate CA generation.
- 
FirewallPolicy Certificate Authority Response 
- The CA used for intermediate CA generation.
- Property Map
- The CA used for intermediate CA generation.
ManagedServiceIdentity, ManagedServiceIdentityArgs      
- Type
Pulumi.Azure Native. Network. Resource Identity Type 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- UserAssigned List<string>Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- Type
ResourceIdentity Type 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- UserAssigned []stringIdentities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- type
ResourceIdentity Type 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned List<String>Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- type
ResourceIdentity Type 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned string[]Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- type
ResourceIdentity Type 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- user_assigned_ Sequence[str]identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- type
"SystemAssigned" | "User Assigned" | "System Assigned, User Assigned" | "None" 
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned List<String>Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
ManagedServiceIdentityResponse, ManagedServiceIdentityResponseArgs        
- PrincipalId string
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- TenantId string
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- Type string
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- UserAssigned Dictionary<string, Pulumi.Identities Azure Native. Network. Inputs. Managed Service Identity Response User Assigned Identities> 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- PrincipalId string
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- TenantId string
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- Type string
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- UserAssigned map[string]ManagedIdentities Service Identity Response User Assigned Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- principalId String
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- tenantId String
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- type String
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned Map<String,ManagedIdentities Service Identity Response User Assigned Identities> 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- principalId string
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- tenantId string
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- type string
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned {[key: string]: ManagedIdentities Service Identity Response User Assigned Identities} 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- principal_id str
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- tenant_id str
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- type str
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- user_assigned_ Mapping[str, Managedidentities Service Identity Response User Assigned Identities] 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
- principalId String
- The principal id of the system assigned identity. This property will only be provided for a system assigned identity.
- tenantId String
- The tenant id of the system assigned identity. This property will only be provided for a system assigned identity.
- type String
- The type of identity used for the resource. The type 'SystemAssigned, UserAssigned' includes both an implicitly created identity and a set of user assigned identities. The type 'None' will remove any identities from the virtual machine.
- userAssigned Map<Property Map>Identities 
- The list of user identities associated with resource. The user identity dictionary key references will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'.
ManagedServiceIdentityResponseUserAssignedIdentities, ManagedServiceIdentityResponseUserAssignedIdentitiesArgs              
- ClientId string
- The client id of user assigned identity.
- PrincipalId string
- The principal id of user assigned identity.
- ClientId string
- The client id of user assigned identity.
- PrincipalId string
- The principal id of user assigned identity.
- clientId String
- The client id of user assigned identity.
- principalId String
- The principal id of user assigned identity.
- clientId string
- The client id of user assigned identity.
- principalId string
- The principal id of user assigned identity.
- client_id str
- The client id of user assigned identity.
- principal_id str
- The principal id of user assigned identity.
- clientId String
- The client id of user assigned identity.
- principalId String
- The principal id of user assigned identity.
ResourceIdentityType, ResourceIdentityTypeArgs      
- SystemAssigned 
- SystemAssigned
- UserAssigned 
- UserAssigned
- SystemAssigned_User Assigned 
- SystemAssigned, UserAssigned
- None
- None
- ResourceIdentity Type System Assigned 
- SystemAssigned
- ResourceIdentity Type User Assigned 
- UserAssigned
- ResourceIdentity Type_System Assigned_User Assigned 
- SystemAssigned, UserAssigned
- ResourceIdentity Type None 
- None
- SystemAssigned 
- SystemAssigned
- UserAssigned 
- UserAssigned
- SystemAssigned_User Assigned 
- SystemAssigned, UserAssigned
- None
- None
- SystemAssigned 
- SystemAssigned
- UserAssigned 
- UserAssigned
- SystemAssigned_User Assigned 
- SystemAssigned, UserAssigned
- None
- None
- SYSTEM_ASSIGNED
- SystemAssigned
- USER_ASSIGNED
- UserAssigned
- SYSTEM_ASSIGNED_USER_ASSIGNED
- SystemAssigned, UserAssigned
- NONE
- None
- "SystemAssigned" 
- SystemAssigned
- "UserAssigned" 
- UserAssigned
- "SystemAssigned, User Assigned" 
- SystemAssigned, UserAssigned
- "None"
- None
SubResource, SubResourceArgs    
- Id string
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
- Id string
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
- id String
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
- id string
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
- id str
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
- id String
- Sub-resource ID. Both absolute resource ID and a relative resource ID are accepted. An absolute ID starts with /subscriptions/ and contains the entire ID of the parent resource and the ID of the sub-resource in the end. A relative ID replaces the ID of the parent resource with a token '$self', followed by the sub-resource ID itself. Example of a relative ID: $self/frontEndConfigurations/my-frontend.
SubResourceResponse, SubResourceResponseArgs      
- Id string
- Resource ID.
- Id string
- Resource ID.
- id String
- Resource ID.
- id string
- Resource ID.
- id str
- Resource ID.
- id String
- Resource ID.
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:network:FirewallPolicy firewallPolicy /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/firewallPolicies/{firewallPolicyName} 
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0