Firewall Rule

Creates and manages Firewall Rules.

Manages a set of firewall rules on IonosCloud.

Example Usage

resource "ionoscloud_firewall" "example" {
  datacenter_id    = "${ionoscloud_datacenter.example.id}"
  server_id        = "${ionoscloud_server.example.id}"
  nic_id           = "${ionoscloud_server.example.primary_nic}"
  protocol         = "TCP"
  name             = "test"
  port_range_start = 1
  port_range_end   = 2
}

Argument reference

  • datacenter_id - (Required)[string] The Virtual Data Center ID.

  • server_id - (Required)[string] The Server ID.

  • nic_id - (Required)[string] The NIC ID.

  • protocol - (Required)[string] The protocol for the rule: TCP, UDP, ICMP, ANY. Property cannot be modified after creation (disallowed in update requests).

  • name - (Optional)[string] The name of the firewall rule.

  • source_mac - (Optional)[string] Only traffic originating from the respective MAC address is allowed. Valid format: aa:bb:cc:dd:ee:ff. Value null allows all source MAC address. Valid format: aa:bb:cc:dd:ee:ff.

  • source_ip - (Optional)[string] Only traffic originating from the respective IPv4 address is allowed. Value null allows all source IPs.

  • target_ip - (Optional)[string] In case the target NIC has multiple IP addresses, only traffic directed to the respective IP address of the NIC is allowed. Value null allows all target IPs.

  • port_range_start - (Optional)[int] Defines the start range of the allowed port (from 1 to 65534) if protocol TCP or UDP is chosen. Leave portRangeStart and portRangeEnd null to allow all ports.

  • port_range_end - (Optional)[int] Defines the end range of the allowed port (from 1 to 65534) if the protocol TCP or UDP is chosen. Leave portRangeStart and portRangeEnd null to allow all ports.

  • icmp_type - (Optional)[string] Defines the allowed code (from 0 to 254) if protocol ICMP is chosen. Value null allows all codes.

  • icmp_code - (Optional)[string] Defines the allowed type (from 0 to 254) if the protocol ICMP is chosen. Value null allows all types

Import

Resource Firewall can be imported using the resource id, e.g.

terraform import ionoscloud_firewall.myfwrule {datacenter uuid}/{server uuid}/{nic uuid}/{firewall uuid}

Last updated