@akamai/openapi-ts
    Preparing search index...

    Type Alias GetFirewallTemplateResponses

    type GetFirewallTemplateResponses = {
        "200": {
            rules: {
                inbound: {
                    action: "ACCEPT" | "DROP";
                    addresses: { ipv4: string[]; ipv6: string[] };
                    description: string;
                    label: string;
                    ports: string | null;
                    protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
                }[];
                inbound_policy: "ACCEPT"
                | "DROP";
                outbound: {
                    action: "ACCEPT" | "DROP";
                    addresses: { ipv4: string[]; ipv6: string[] };
                    description: string;
                    label: string;
                    ports: string | null;
                    protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
                }[];
                outbound_policy: "ACCEPT"
                | "DROP";
            };
            slug: "vpc"
            | "public";
        };
    }
    Index

    Properties

    Properties

    "200": {
        rules: {
            inbound: {
                action: "ACCEPT" | "DROP";
                addresses: { ipv4: string[]; ipv6: string[] };
                description: string;
                label: string;
                ports: string | null;
                protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            inbound_policy: "ACCEPT"
            | "DROP";
            outbound: {
                action: "ACCEPT" | "DROP";
                addresses: { ipv4: string[]; ipv6: string[] };
                description: string;
                label: string;
                ports: string | null;
                protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            outbound_policy: "ACCEPT"
            | "DROP";
        };
        slug: "vpc"
        | "public";
    }

    A list of firewall templates and their rules.

    Type Declaration

    • rules: {
          inbound: {
              action: "ACCEPT" | "DROP";
              addresses: { ipv4: string[]; ipv6: string[] };
              description: string;
              label: string;
              ports: string | null;
              protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
          }[];
          inbound_policy: "ACCEPT"
          | "DROP";
          outbound: {
              action: "ACCEPT" | "DROP";
              addresses: { ipv4: string[]; ipv6: string[] };
              description: string;
              label: string;
              ports: string | null;
              protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
          }[];
          outbound_policy: "ACCEPT"
          | "DROP";
      }

      The inbound and outbound access rules for the VPC firewall template.

      A firewall can have up to 25 rules across its inbound and outbound rule sets. Multiple rules are applied in order. If two rules conflict, the first rule takes precedence. For example, if the first rule accepts inbound traffic from an address, and the second rule drops inbound traffic from the same address, the first rule applies, and inbound traffic from that address is accepted.

      • inbound: {
            action: "ACCEPT" | "DROP";
            addresses: { ipv4: string[]; ipv6: string[] };
            description: string;
            label: string;
            ports: string | null;
            protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[]

        The inbound rules for the firewall.

      • inbound_policy: "ACCEPT" | "DROP"

        The default behavior for inbound traffic. You can override this setting by updating the inbound object's action field.

      • outbound: {
            action: "ACCEPT" | "DROP";
            addresses: { ipv4: string[]; ipv6: string[] };
            description: string;
            label: string;
            ports: string | null;
            protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[]

        The outbound rules for the firewall.

      • outbound_policy: "ACCEPT" | "DROP"

        The default behavior for outbound traffic. You can override this setting by updating the outbound object's action fields.

    • slug: "vpc" | "public"

      Read-only The firewall template types available for VPC and public Linode interfaces.