POST
/
firewall
/
rule

Authorizations

x-api-key
string
headerrequired

Body

application/json
descr
string

Description of the firewall rule.

dst
string
required

Destination IP the firewall rule needs to be created for (subnets supported).

src
object

Source IP the firewall rule needs to match.

port
object
protocol
string
required

Internet Protocol version this rule applies to. Allowed options: any, ip, hopopt, icmp, igmp, ggp, ipencap, st, tcp, egp, igp, pup, udp, hmp, xns-idp, rdp, iso-tp4, dccp, xtp, ddp, idpr-cmtp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, esp, ah, skip, ipv6-icmp, ipv6-nonxt, ipv6-opts, rspf, vmtp, eigrp, ospf, ax.25, ipip, etherip, encap, pim, ipcomp, vrrp, l2tp, isis, sctp, fc, mobility-header, udplite, mpls-in-ip, manet, hip, shim6, wesp, rohc, ethernet, mptcp

action
string
required

Allowed options: accept, continue, drop and reject

priority
integer
required

Rule priority with 1 being highest priority.

disabled
boolean

Enable or disable the firewall rule.

tcpflags
any[]

TCP flags the rule must match to. Allowed options: fin, syn, rst, psh, ack, urg, ece, cwr

ratelimit
number

Ratelimit 0 - 4294967295.

packetlength
number

Packet length 1 - 65535.

packettype
integer

Allowed options: broadcast, host, multicast, other

statetype
string

Allowed options: established, invalid, new, related.

Response

200 - application/json

The response is of type object.