Inserting a Network ACL Rule
Function
This API is used to insert a network ACL rule to a network ACL policy.
URI
PUT /v2.0/fwaas/firewall_policies/{firewall_policy_id}/insert_rule
Request Message
|
Parameter |
Type |
Mandatory |
Description |
|---|---|---|---|
|
firewall_policy_id |
String |
Yes |
Specifies the network ACL policy ID, which uniquely identifies the network ACL policy. |
|
firewall_rule_id |
String |
Yes |
Specifies the network ACL rule ID, which uniquely identifies the network ACL rule. |
|
insert_after |
String |
No |
The insert_after parameter indicates the firewall rule that has already been associated with the firewall policy. A new firewall rule will be inserted after the firewall rule associated with the firewall policy. If both the insert_after and insert_before parameters are specified, the insert_after parameter will be ignored. |
|
insert_before |
String |
No |
The insert_before parameter indicates the firewall rule that has already been associated with the firewall policy. A new firewall rule will be inserted before the firewall rule associated with the firewall policy. If both the insert_after and insert_before parameters are specified, the insert_after parameter will be ignored. |
Response Message
|
Parameter |
Type |
Description |
|---|---|---|
|
description |
String |
Provides supplementary information about the firewall policy. |
|
audited |
Boolean |
Each time the firewall policy or the associated firewall rules are changed, this attribute will be set to False. |
|
firewall_rules |
Array of strings |
Specifies the ID list of the firewall rules associated with the current firewall policy. |
|
id |
String |
Specifies the firewall policy ID. |
|
name |
String |
Specifies the firewall policy name. |
|
public |
Boolean |
If this attribute is set to True, the network ACL policy is visible to tenants other than its owner. The network ACL policy is not visible to other tenants by default. |
|
tenant_id |
String |
Specifies the project ID. |
|
project_id |
String |
Specifies the project ID. |
Example:
Example request
PUT https://{Endpoint}/v2.0/fwaas/firewall_policies/afc52ce9-5305-4ec9-9feb-44feb8330341/insert_rule
{
"insert_after": "b8243448-cb3c-496e-851c-dadade4c161b",
"firewall_rule_id": "0f82b221-8cd6-44bd-9dfc-0e118fa7b6b1",
"insert_before": ""
}
Example response
{
"description": "",
"firewall_rules": [
"b8243448-cb3c-496e-851c-dadade4c161b",
"0f82b221-8cd6-44bd-9dfc-0e118fa7b6b1"
],
"tenant_id": "23c8a121505047b6869edf39f3062712",
"public": false,
"id": "afc52ce9-5305-4ec9-9feb-44feb8330341",
"audited": false,
"name": "test-policy",
"project_id": "23c8a121505047b6869edf39f3062712"
}
Status Code
See Status Codes.
Error Code
See Error Codes.
Last Article: Deleting a Network ACL Policy
Next Article: Removing a Network ACL Rule
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.