Inserting a Network ACL Rule
Function
This API is used to insert a network ACL rule.
Debugging
You can debug this API through automatic authentication in API Explorer.
URI
PUT /v3/{project_id}/vpc/firewalls/{firewall_id}/insert-rules
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
firewall_id |
Yes |
String |
Unique ID of a network ACL. |
project_id |
Yes |
String |
Project ID. For details about how to obtain a project ID, see Obtaining a Project ID. |
Request Parameters
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
firewall |
Yes |
FirewallInsertRuleOption object |
Details about the inbound and outbound network ACL rules to be inserted. |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
ingress_rules |
No |
Array of FirewallInsertRuleItemOption objects |
|
egress_rules |
No |
Array of FirewallInsertRuleItemOption objects |
|
insert_after_rule |
No |
String |
|
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
name |
No |
String |
|
description |
No |
String |
|
action |
Yes |
String |
|
protocol |
Yes |
String |
|
ip_version |
Yes |
Integer |
|
source_ip_address |
No |
String |
|
destination_ip_address |
No |
String |
|
source_port |
No |
String |
|
destination_port |
No |
String |
|
source_address_group_id |
No |
String |
|
destination_address_group_id |
No |
String |
|
enabled |
No |
Boolean |
|
Response Parameters
Status code: 200
Parameter |
Type |
Description |
---|---|---|
firewall |
FirewallDetail object |
Details after the network ACL rules are inserted. |
request_id |
String |
Request ID. |
Parameter |
Type |
Description |
---|---|---|
id |
String |
|
name |
String |
|
description |
String |
|
project_id |
String |
|
created_at |
String |
|
updated_at |
String |
|
admin_state_up |
Boolean |
|
status |
String |
|
enterprise_project_id |
String |
|
tags |
Array of ResourceTag objects |
|
associations |
Array of FirewallAssociation objects |
|
ingress_rules |
Array of FirewallRuleDetail objects |
|
egress_rules |
Array of FirewallRuleDetail objects |
|
Parameter |
Type |
Description |
---|---|---|
key |
String |
Minimum: 1 Maximum: 128 |
value |
String |
Maximum: 255 |
Parameter |
Type |
Description |
---|---|---|
virsubnet_id |
String |
|
Parameter |
Type |
Description |
---|---|---|
id |
String |
|
name |
String |
|
description |
String |
|
action |
String |
|
project_id |
String |
|
protocol |
String |
|
ip_version |
Integer |
|
source_ip_address |
String |
|
destination_ip_address |
String |
|
source_port |
String |
|
destination_port |
String |
|
source_address_group_id |
String |
|
destination_address_group_id |
String |
|
enabled |
Boolean |
|
Example Requests
-
Insert an inbound rule below the rule whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5630 to the network ACL whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5629.
PUT https://{Endpoint}/v3/{project_id}/vpc/firewalls/e9a7731d-5bd9-4250-a524-b9a076fd5629/insert-rules { "firewall" : { "ingress_rules" : [ { "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "protocol" : "tcp", "ip_version" : "4", "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90", "source_address_group_id" : null, "destination_address_group_id" : null } ], "insert_after_rule" : "e9a7731d-5bd9-4250-a524-b9a076fd5630" } }
-
Insert an outbound rule below the rule whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5630 to the network ACL whose ID is e9a7731d-5bd9-4250-a524-b9a076fd5629.
PUT https://{Endpoint}/v3/{project_id}/vpc/firewalls/e9a7731d-5bd9-4250-a524-b9a076fd5629/insert-rules { "firewall" : { "egress_rules" : [ { "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "protocol" : "tcp", "ip_version" : "4", "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90", "source_address_group_id" : null, "destination_address_group_id" : null } ], "insert_after_rule" : "e9a7731d-5bd9-4250-a524-b9a076fd5630" } }
Example Responses
Status code: 200
Normal response to the PUT operation. For more status codes, see Status Codes.
-
{ "firewall" : { "id" : "e9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_test1", "description" : "network_acl_test1", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "created_at" : "2022-04-07T07:30:46.000+00:00", "updated_at" : "2022-04-07T07:30:46.000+00:00", "admin_state_up" : true, "enterprise_project_id" : "158ad39a-dab7-45a3-9b5a-2836b3cf93f9", "status" : "ACTIVE", "tags" : [ ], "ingress_rules" : [ { "id" : "e9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "protocol" : "tcp", "ip_version" : 4, "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90" } ], "egress_rules" : [ { "id" : "f9a7731d-5bd9-4250-a524-b9a076fd5629", "name" : "network_acl_rule test", "description" : "network_acl_rule test", "action" : "allow", "project_id" : "9476ea5a8a9849c38358e43c0c3a9e12", "protocol" : "tcp", "ip_version" : 4, "source_ip_address" : "192.168.3.0/24", "destination_ip_address" : "192.168.6.0/24", "source_port" : "30-40,60-90", "destination_port" : "40-60,70-90" } ], "associations" : [ { "virsubnet_id" : "8359e5b0-353f-4ef3-a071-98e67a34a143" } ] } }
Status Codes
Status Code |
Description |
---|---|
200 |
Normal response to the PUT operation. For more status codes, see Status Codes. |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot