Inserting a Network ACL Rule
Function
This API is used to insert a network ACL rule.
URI
PUT /v3/{project_id}/vpc/firewalls/{firewall_id}/insert-rules
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
firewall_id |
Yes |
String |
Unique ID of a network ACL. |
project_id |
Yes |
String |
Project ID. For details about how to obtain a project ID, see Obtaining a Project ID. |
Request Parameters
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
firewall |
Yes |
FirewallInsertRuleOption object |
Details about the inbound and outbound network ACL rules to be inserted. |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
ingress_rules |
No |
Array of FirewallInsertRuleItemOption objects |
|
egress_rules |
No |
Array of FirewallInsertRuleItemOption objects |
|
insert_after_rule |
No |
String |
|
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
name |
No |
String |
|
description |
No |
String |
|
action |
Yes |
String |
|
protocol |
Yes |
String |
|
ip_version |
Yes |
Integer |
|
source_ip_address |
No |
String |
|
destination_ip_address |
No |
String |
|
source_port |
No |
String |
|
destination_port |
No |
String |
|
source_address_group_id |
No |
String |
|
destination_address_group_id |
No |
String |
|
enabled |
No |
Boolean |
|
Response Parameters
Status code: 200
Parameter |
Type |
Description |
---|---|---|
firewall |
FirewallDetail object |
Details after the network ACL rules are inserted. |
request_id |
String |
Request ID. |
Parameter |
Type |
Description |
---|---|---|
id |
String |
|
name |
String |
|
description |
String |
|
project_id |
String |
|
created_at |
String |
|
updated_at |
String |
|
admin_state_up |
Boolean |
|
status |
String |
|
enterprise_project_id |
String |
|
tags |
Array of ResourceTag objects |
|
associations |
Array of FirewallAssociation objects |
|
ingress_rules |
Array of FirewallRuleDetail objects |
|
egress_rules |
Array of FirewallRuleDetail objects |
|
Parameter |
Type |
Description |
---|---|---|
key |
String |
Minimum: 1 Maximum: 128 |
value |
String |
Maximum: 255 |
Parameter |
Type |
Description |
---|---|---|
virsubnet_id |
String |
|
Parameter |
Type |
Description |
---|---|---|
id |
String |
|
name |
String |
|
description |
String |
|
action |
String |
|
project_id |
String |
|
protocol |
String |
|
ip_version |
Integer |
|
source_ip_address |
String |
|
destination_ip_address |
String |
|
source_port |
String |
|
destination_port |
String |
|
source_address_group_id |
String |
|
destination_address_group_id |
String |
|
enabled |
Boolean |
|
Example Requests
-
Insert an inbound rule below the rule whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5630 to the network ACL whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5629.
PUT https://{Endpoint}/v3/{project_id}/vpc/firewalls/e9a7731d-5bd9-4250-a524-b9a076fd5629/insert-rules { "firewall" : { "ingress_rules" : [ { "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "protocol" : "tcp", "ip_version" : "4", "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90", "source_address_group_id" : null, "destination_address_group_id" : null } ], "insert_after_rule" : "e9a7731d-5bd9-4250-a524-b9a076fd5630" } }
-
Insert an outbound rule below the rule whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5630 to the network ACL whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5629.
PUT https://{Endpoint}/v3/{project_id}/vpc/firewalls/e9a7731d-5bd9-4250-a524-b9a076fd5629/insert-rules { "firewall" : { "egress_rules" : [ { "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "protocol" : "tcp", "ip_version" : "4", "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90", "source_address_group_id" : null, "destination_address_group_id" : null } ], "insert_after_rule" : "e9a7731d-5bd9-4250-a524-b9a076fd5630" } }
Example Responses
Status code: 200
Normal response to the PUT operation. For more status codes, see Status Codes.
-
{ "firewall" : { "id" : "e9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_test1", "description" : "network_acl_test1", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "created_at" : "2022-04-07T07:30:46.000+00:00", "updated_at" : "2022-04-07T07:30:46.000+00:00", "admin_state_up" : true, "enterprise_project_id" : "158ad39a-dab7-45a3-9b5a-2836b3cf93f9", "status" : "ACTIVE", "tags" : [ ], "ingress_rules" : [ { "id" : "e9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "protocol" : "tcp", "ip_version" : 4, "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90" } ], "egress_rules" : [ { "id" : "f9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "protocol" : "tcp", "ip_version" : 4, "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90" } ], "associations" : [ { "virsubnet_id" : "8359e5b0-353f-4ef3-a071-98e67a34a143" } ] } }
Status Codes
Status Code |
Description |
---|---|
200 |
Normal response to the PUT operation. For more status codes, see Status Codes. |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.