1. Packages
  2. Cisco Meraki Provider
  3. API Docs
  4. networks
  5. getApplianceFirewallInboundFirewallRules
Cisco Meraki v0.4.4 published on Wednesday, Oct 22, 2025 by Pulumi
meraki logo
Cisco Meraki v0.4.4 published on Wednesday, Oct 22, 2025 by Pulumi

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as meraki from "@pulumi/meraki";
    
    const example = meraki.networks.getApplianceFirewallInboundFirewallRules({
        networkId: "string",
    });
    export const merakiNetworksApplianceFirewallInboundFirewallRulesExample = example.then(example => example.item);
    
    import pulumi
    import pulumi_meraki as meraki
    
    example = meraki.networks.get_appliance_firewall_inbound_firewall_rules(network_id="string")
    pulumi.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.item)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := networks.LookupApplianceFirewallInboundFirewallRules(ctx, &networks.LookupApplianceFirewallInboundFirewallRulesArgs{
    			NetworkId: "string",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		ctx.Export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.Item)
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Meraki = Pulumi.Meraki;
    
    return await Deployment.RunAsync(() => 
    {
        var example = Meraki.Networks.GetApplianceFirewallInboundFirewallRules.Invoke(new()
        {
            NetworkId = "string",
        });
    
        return new Dictionary<string, object?>
        {
            ["merakiNetworksApplianceFirewallInboundFirewallRulesExample"] = example.Apply(getApplianceFirewallInboundFirewallRulesResult => getApplianceFirewallInboundFirewallRulesResult.Item),
        };
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.meraki.networks.NetworksFunctions;
    import com.pulumi.meraki.networks.inputs.GetApplianceFirewallInboundFirewallRulesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var example = NetworksFunctions.getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs.builder()
                .networkId("string")
                .build());
    
            ctx.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.item());
        }
    }
    
    variables:
      example:
        fn::invoke:
          function: meraki:networks:getApplianceFirewallInboundFirewallRules
          arguments:
            networkId: string
    outputs:
      merakiNetworksApplianceFirewallInboundFirewallRulesExample: ${example.item}
    

    Using getApplianceFirewallInboundFirewallRules

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getApplianceFirewallInboundFirewallRules(args: GetApplianceFirewallInboundFirewallRulesArgs, opts?: InvokeOptions): Promise<GetApplianceFirewallInboundFirewallRulesResult>
    function getApplianceFirewallInboundFirewallRulesOutput(args: GetApplianceFirewallInboundFirewallRulesOutputArgs, opts?: InvokeOptions): Output<GetApplianceFirewallInboundFirewallRulesResult>
    def get_appliance_firewall_inbound_firewall_rules(network_id: Optional[str] = None,
                                                      opts: Optional[InvokeOptions] = None) -> GetApplianceFirewallInboundFirewallRulesResult
    def get_appliance_firewall_inbound_firewall_rules_output(network_id: Optional[pulumi.Input[str]] = None,
                                                      opts: Optional[InvokeOptions] = None) -> Output[GetApplianceFirewallInboundFirewallRulesResult]
    func LookupApplianceFirewallInboundFirewallRules(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesArgs, opts ...InvokeOption) (*LookupApplianceFirewallInboundFirewallRulesResult, error)
    func LookupApplianceFirewallInboundFirewallRulesOutput(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesOutputArgs, opts ...InvokeOption) LookupApplianceFirewallInboundFirewallRulesResultOutput

    > Note: This function is named LookupApplianceFirewallInboundFirewallRules in the Go SDK.

    public static class GetApplianceFirewallInboundFirewallRules 
    {
        public static Task<GetApplianceFirewallInboundFirewallRulesResult> InvokeAsync(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions? opts = null)
        public static Output<GetApplianceFirewallInboundFirewallRulesResult> Invoke(GetApplianceFirewallInboundFirewallRulesInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetApplianceFirewallInboundFirewallRulesResult> getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions options)
    public static Output<GetApplianceFirewallInboundFirewallRulesResult> getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions options)
    
    fn::invoke:
      function: meraki:networks/getApplianceFirewallInboundFirewallRules:getApplianceFirewallInboundFirewallRules
      arguments:
        # arguments dictionary

    The following arguments are supported:

    NetworkId string
    networkId path parameter. Network ID
    NetworkId string
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID
    networkId string
    networkId path parameter. Network ID
    network_id str
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID

    getApplianceFirewallInboundFirewallRules Result

    The following output properties are available:

    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceFirewallInboundFirewallRulesItem
    NetworkId string
    networkId path parameter. Network ID
    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceFirewallInboundFirewallRulesItem
    NetworkId string
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    networkId String
    networkId path parameter. Network ID
    id string
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    networkId string
    networkId path parameter. Network ID
    id str
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    network_id str
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item Property Map
    networkId String
    networkId path parameter. Network ID

    Supporting Types

    GetApplianceFirewallInboundFirewallRulesItem

    Rules List<GetApplianceFirewallInboundFirewallRulesItemRule>
    An ordered array of the firewall rules (not including the default rule)
    SyslogDefaultRule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    Rules []GetApplianceFirewallInboundFirewallRulesItemRule
    An ordered array of the firewall rules (not including the default rule)
    SyslogDefaultRule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules List<GetApplianceFirewallInboundFirewallRulesItemRule>
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule Boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules GetApplianceFirewallInboundFirewallRulesItemRule[]
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules Sequence[GetApplianceFirewallInboundFirewallRulesItemRule]
    An ordered array of the firewall rules (not including the default rule)
    syslog_default_rule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules List<Property Map>
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule Boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)

    GetApplianceFirewallInboundFirewallRulesItemRule

    Comment string
    Description of the rule (optional)
    DestCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    DestPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    Policy string
    'allow' or 'deny' traffic specified by this rule
    Protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    SrcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    SrcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    SyslogEnabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    Comment string
    Description of the rule (optional)
    DestCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    DestPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    Policy string
    'allow' or 'deny' traffic specified by this rule
    Protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    SrcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    SrcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    SyslogEnabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment String
    Description of the rule (optional)
    destCidr String
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort String
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy String
    'allow' or 'deny' traffic specified by this rule
    protocol String
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr String
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort String
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled Boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment string
    Description of the rule (optional)
    destCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy string
    'allow' or 'deny' traffic specified by this rule
    protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment str
    Description of the rule (optional)
    dest_cidr str
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    dest_port str
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy str
    'allow' or 'deny' traffic specified by this rule
    protocol str
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    src_cidr str
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    src_port str
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslog_enabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment String
    Description of the rule (optional)
    destCidr String
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort String
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy String
    'allow' or 'deny' traffic specified by this rule
    protocol String
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr String
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort String
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled Boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)

    Package Details

    Repository
    meraki pulumi/pulumi-meraki
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the meraki Terraform Provider.
    meraki logo
    Cisco Meraki v0.4.4 published on Wednesday, Oct 22, 2025 by Pulumi
      Meet Neo: Your AI Platform Teammate