Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Bicep resource definition
The networkVirtualAppliances/inboundSecurityRules resource type can be deployed with operations that target:
- Resource groups - See resource group deployment commands
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/networkVirtualAppliances/inboundSecurityRules resource, add the following Bicep to your template.
resource symbolicname 'Microsoft.Network/networkVirtualAppliances/inboundSecurityRules@2022-01-01' = {
parent: resourceSymbolicName
name: 'string'
properties: {
rules: [
{
destinationPortRange: int
protocol: 'string'
sourceAddressPrefix: 'string'
}
]
}
}
Property Values
Microsoft.Network/networkVirtualAppliances/inboundSecurityRules
Name | Description | Value |
---|---|---|
name | The resource name | string (required) |
parent | In Bicep, you can specify the parent resource for a child resource. You only need to add this property when the child resource is declared outside of the parent resource. For more information, see Child resource outside parent resource. |
Symbolic name for resource of type: networkVirtualAppliances |
properties | The properties of the Inbound Security Rules. | InboundSecurityRuleProperties |
InboundSecurityRuleProperties
Name | Description | Value |
---|---|---|
rules | List of allowed rules. | InboundSecurityRules[] |
InboundSecurityRules
Name | Description | Value |
---|---|---|
destinationPortRange | NVA port ranges to be opened up. One needs to provide specific ports. | int Constraints: Min value = 0 Max value = 65535 |
protocol | Protocol. This should be either TCP or UDP. | 'TCP' 'UDP' |
sourceAddressPrefix | The CIDR or source IP range. Only /30, /31 and /32 Ip ranges are allowed. | string |
ARM template resource definition
The networkVirtualAppliances/inboundSecurityRules resource type can be deployed with operations that target:
- Resource groups - See resource group deployment commands
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/networkVirtualAppliances/inboundSecurityRules resource, add the following JSON to your template.
{
"type": "Microsoft.Network/networkVirtualAppliances/inboundSecurityRules",
"apiVersion": "2022-01-01",
"name": "string",
"properties": {
"rules": [
{
"destinationPortRange": "int",
"protocol": "string",
"sourceAddressPrefix": "string"
}
]
}
}
Property Values
Microsoft.Network/networkVirtualAppliances/inboundSecurityRules
Name | Description | Value |
---|---|---|
apiVersion | The api version | '2022-01-01' |
name | The resource name | string (required) |
properties | The properties of the Inbound Security Rules. | InboundSecurityRuleProperties |
type | The resource type | 'Microsoft.Network/networkVirtualAppliances/inboundSecurityRules' |
InboundSecurityRuleProperties
Name | Description | Value |
---|---|---|
rules | List of allowed rules. | InboundSecurityRules[] |
InboundSecurityRules
Name | Description | Value |
---|---|---|
destinationPortRange | NVA port ranges to be opened up. One needs to provide specific ports. | int Constraints: Min value = 0 Max value = 65535 |
protocol | Protocol. This should be either TCP or UDP. | 'TCP' 'UDP' |
sourceAddressPrefix | The CIDR or source IP range. Only /30, /31 and /32 Ip ranges are allowed. | string |
Usage Examples
Terraform (AzAPI provider) resource definition
The networkVirtualAppliances/inboundSecurityRules resource type can be deployed with operations that target:
- Resource groups
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/networkVirtualAppliances/inboundSecurityRules resource, add the following Terraform to your template.
resource "azapi_resource" "symbolicname" {
type = "Microsoft.Network/networkVirtualAppliances/inboundSecurityRules@2022-01-01"
name = "string"
parent_id = "string"
body = {
properties = {
rules = [
{
destinationPortRange = int
protocol = "string"
sourceAddressPrefix = "string"
}
]
}
}
}
Property Values
Microsoft.Network/networkVirtualAppliances/inboundSecurityRules
Name | Description | Value |
---|---|---|
name | The resource name | string (required) |
parent_id | The ID of the resource that is the parent for this resource. | ID for resource of type: networkVirtualAppliances |
properties | The properties of the Inbound Security Rules. | InboundSecurityRuleProperties |
type | The resource type | "Microsoft.Network/networkVirtualAppliances/inboundSecurityRules@2022-01-01" |
InboundSecurityRuleProperties
Name | Description | Value |
---|---|---|
rules | List of allowed rules. | InboundSecurityRules[] |
InboundSecurityRules
Name | Description | Value |
---|---|---|
destinationPortRange | NVA port ranges to be opened up. One needs to provide specific ports. | int Constraints: Min value = 0 Max value = 65535 |
protocol | Protocol. This should be either TCP or UDP. | 'TCP' 'UDP' |
sourceAddressPrefix | The CIDR or source IP range. Only /30, /31 and /32 Ip ranges are allowed. | string |