@akamai/openapi-ts
    Preparing search index...

    Type Alias PostFirewallsResponses

    type PostFirewallsResponses = {
        "200": {
            created: string;
            entities: {
                id: number;
                label: string;
                parent_entity:
                    | {
                        id: number;
                        label: string;
                        parent_entity: string
                        | null;
                        type: "linode";
                        url: string;
                    }
                    | null;
                type: "linode"
                | "linode_interface"
                | "nodebalancer";
                url: string;
            }[];
            id: number;
            label: string;
            rules: {
                fingerprint: string;
                inbound: {
                    action: "ACCEPT"
                    | "DROP";
                    addresses: { ipv4: string[]; ipv6: string[] };
                    description: string;
                    label: string;
                    ports: string | null;
                    protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
                }[];
                inbound_policy: "ACCEPT"
                | "DROP";
                outbound: {
                    action: "ACCEPT" | "DROP";
                    addresses: { ipv4: string[]; ipv6: string[] };
                    description: string;
                    label: string;
                    ports: string | null;
                    protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
                }[];
                outbound_policy: "ACCEPT"
                | "DROP";
                version: number;
            };
            status: "enabled"
            | "disabled"
            | "deleted";
            tags: string[];
            updated: string;
        };
    }
    Index

    Properties

    Properties

    "200": {
        created: string;
        entities: {
            id: number;
            label: string;
            parent_entity:
                | {
                    id: number;
                    label: string;
                    parent_entity: string
                    | null;
                    type: "linode";
                    url: string;
                }
                | null;
            type: "linode"
            | "linode_interface"
            | "nodebalancer";
            url: string;
        }[];
        id: number;
        label: string;
        rules: {
            fingerprint: string;
            inbound: {
                action: "ACCEPT"
                | "DROP";
                addresses: { ipv4: string[]; ipv6: string[] };
                description: string;
                label: string;
                ports: string | null;
                protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            inbound_policy: "ACCEPT"
            | "DROP";
            outbound: {
                action: "ACCEPT" | "DROP";
                addresses: { ipv4: string[]; ipv6: string[] };
                description: string;
                label: string;
                ports: string | null;
                protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            outbound_policy: "ACCEPT"
            | "DROP";
            version: number;
        };
        status: "enabled"
        | "disabled"
        | "deleted";
        tags: string[];
        updated: string;
    }

    A resource that controls incoming and outgoing network traffic to a compute service. Only one enabled Firewall can be attached to a particular service at any given time. Create a firewall device to assign a Firewall to a service. Currently, Firewalls can assigned to Linode compute instances and NodeBalancers.

    Type Declaration

    • Readonlycreated: string

      Filterable, Read-only When this Firewall was created.

    • Readonlyentities: {
          id: number;
          label: string;
          parent_entity:
              | {
                  id: number;
                  label: string;
                  parent_entity: string
                  | null;
                  type: "linode";
                  url: string;
              }
              | null;
          type: "linode"
          | "linode_interface"
          | "nodebalancer";
          url: string;
      }[]

      Read-only The Linodes, NodeBalancers, and Linode interfaces this firewall is assigned to.

    • Readonlyid: number

      Filterable, Read-only The Firewall's unique ID.

    • label: string

      Filterable The Firewall's label, for display purposes only.

      Firewall labels have the following constraints:

      • Must begin and end with an alphanumeric character.
      • May only consist of alphanumeric characters, hyphens (-), underscores (_) or periods (.).
      • Cannot have two hyphens (--), underscores (__) or periods (..) in a row.
      • Must be between 3 and 32 characters.
      • Must be unique.
    • rules: {
          fingerprint: string;
          inbound: {
              action: "ACCEPT" | "DROP";
              addresses: { ipv4: string[]; ipv6: string[] };
              description: string;
              label: string;
              ports: string | null;
              protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
          }[];
          inbound_policy: "ACCEPT"
          | "DROP";
          outbound: {
              action: "ACCEPT" | "DROP";
              addresses: { ipv4: string[]; ipv6: string[] };
              description: string;
              label: string;
              ports: string | null;
              protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
          }[];
          outbound_policy: "ACCEPT"
          | "DROP";
          version: number;
      }

      The inbound and outbound access rules to apply to the Firewall.

      A Firewall may have up to 25 rules across its inbound and outbound rulesets.

      Multiple rules are applied in order. If two rules conflict, the first rule takes precedence. For example, if the first rule accepts inbound traffic from an address, and the second rule drops inbound traffic the same address, the first rule applies and inbound traffic from that address is accepted.

      • Readonlyfingerprint: string

        Read-only The fingerprint is a 32-bit hash. It represents the firewall rules as an 8 character hex string. You can use fingerprint to compare rule versions.

      • inbound: {
            action: "ACCEPT" | "DROP";
            addresses: { ipv4: string[]; ipv6: string[] };
            description: string;
            label: string;
            ports: string | null;
            protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[]

        The inbound rules for the firewall, as a JSON array.

      • inbound_policy: "ACCEPT" | "DROP"

        The default behavior for inbound traffic. This setting can be overridden by updating the inbound.action property of the Firewall Rule.

      • outbound: {
            action: "ACCEPT" | "DROP";
            addresses: { ipv4: string[]; ipv6: string[] };
            description: string;
            label: string;
            ports: string | null;
            protocol: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[]

        The outbound rules for the firewall, as a JSON array.

      • outbound_policy: "ACCEPT" | "DROP"

        The default behavior for outbound traffic. This setting can be overridden by updating the outbound.action property of the Firewall Rule.

      • Readonlyversion: number

        Read-only The firewall's rule version. The first version is 1. The version number is incremented when the firewall's rules change.

    • status: "enabled" | "disabled" | "deleted"

      Read-only The status of this Firewall.

      • When a Firewall is first created its status is enabled.
      • Run the Update a firewall operation to set a Firewall's status to enabled or disabled.
      • Run the Delete a firewall operation to delete a Firewall.
    • tags: string[]

      Filterable An array of tags applied to this object. Tags are for organizational purposes only.

    • Readonlyupdated: string

      Filterable, Read-only When this Firewall was last updated.