Firewall Rule
Creates and manages Firewall Rules.
Manages a set of firewall rules on IonosCloud.
Example Usage
resource "ionoscloud_firewall" "example" {
datacenter_id = "${ionoscloud_datacenter.example.id}"
server_id = "${ionoscloud_server.example.id}"
nic_id = "${ionoscloud_server.example.primary_nic}"
protocol = "TCP"
name = "test"
port_range_start = 1
port_range_end = 2
}
Argument reference
datacenter_id
- (Required)[string] The Virtual Data Center ID.server_id
- (Required)[string] The Server ID.nic_id
- (Required)[string] The NIC ID.protocol
- (Required)[string] The protocol for the rule: TCP, UDP, ICMP, ANY. Property cannot be modified after creation (disallowed in update requests).name
- (Optional)[string] The name of the firewall rule.source_mac
- (Optional)[string] Only traffic originating from the respective MAC address is allowed. Valid format: aa:bb:cc:dd:ee:ff. Value null allows all source MAC address. Valid format: aa:bb:cc:dd:ee:ff.source_ip
- (Optional)[string] Only traffic originating from the respective IPv4 address is allowed. Value null allows all source IPs.target_ip
- (Optional)[string] In case the target NIC has multiple IP addresses, only traffic directed to the respective IP address of the NIC is allowed. Value null allows all target IPs.port_range_start
- (Optional)[int] Defines the start range of the allowed port (from 1 to 65534) if protocol TCP or UDP is chosen. Leave portRangeStart and portRangeEnd null to allow all ports.port_range_end
- (Optional)[int] Defines the end range of the allowed port (from 1 to 65534) if the protocol TCP or UDP is chosen. Leave portRangeStart and portRangeEnd null to allow all ports.icmp_type
- (Optional)[string] Defines the allowed code (from 0 to 254) if protocol ICMP is chosen. Value null allows all codes.icmp_code
- (Optional)[string] Defines the allowed type (from 0 to 254) if the protocol ICMP is chosen. Value null allows all types
Import
Resource Firewall can be imported using the resource id
, e.g.
terraform import ionoscloud_firewall.myfwrule {datacenter uuid}/{server uuid}/{nic uuid}/{firewall uuid}
Last updated