@akamai/openapi-ts
    Preparing search index...

    Type Alias PutFirewallRulesData

    type PutFirewallRulesData = {
        body?: {
            fingerprint?: string;
            inbound?: {
                action?: "ACCEPT" | "DROP";
                addresses?: { ipv4?: string[]; ipv6?: string[] };
                description?: string;
                label?: string;
                ports?: string | null;
                protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            inbound_policy?: "ACCEPT"
            | "DROP";
            outbound?: {
                action?: "ACCEPT" | "DROP";
                addresses?: { ipv4?: string[]; ipv6?: string[] };
                description?: string;
                label?: string;
                ports?: string | null;
                protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
            }[];
            outbound_policy?: "ACCEPT"
            | "DROP";
            version?: number;
        } & { inbound?: unknown; outbound?: unknown };
        path: { firewallId: number };
        query?: never;
        url: "networking/firewalls/{firewallId}/rules";
    }
    Index

    Properties

    Properties

    body?: {
        fingerprint?: string;
        inbound?: {
            action?: "ACCEPT" | "DROP";
            addresses?: { ipv4?: string[]; ipv6?: string[] };
            description?: string;
            label?: string;
            ports?: string | null;
            protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[];
        inbound_policy?: "ACCEPT"
        | "DROP";
        outbound?: {
            action?: "ACCEPT" | "DROP";
            addresses?: { ipv4?: string[]; ipv6?: string[] };
            description?: string;
            label?: string;
            ports?: string | null;
            protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
        }[];
        outbound_policy?: "ACCEPT"
        | "DROP";
        version?: number;
    } & { inbound?: unknown; outbound?: unknown }

    The Firewall Rules information to update.

    Type Declaration

    • Optional Readonlyfingerprint?: string

      Read-only The fingerprint is a 32-bit hash. It represents the firewall rules as an 8 character hex string. You can use fingerprint to compare rule versions.

    • Optionalinbound?: {
          action?: "ACCEPT" | "DROP";
          addresses?: { ipv4?: string[]; ipv6?: string[] };
          description?: string;
          label?: string;
          ports?: string | null;
          protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
      }[]

      The inbound rules for the firewall, as a JSON array.

    • Optionalinbound_policy?: "ACCEPT" | "DROP"

      The default behavior for inbound traffic. This setting can be overridden by updating the inbound.action property of the Firewall Rule.

    • Optionaloutbound?: {
          action?: "ACCEPT" | "DROP";
          addresses?: { ipv4?: string[]; ipv6?: string[] };
          description?: string;
          label?: string;
          ports?: string | null;
          protocol?: "TCP" | "UDP" | "ICMP" | "IPENCAP";
      }[]

      The outbound rules for the firewall, as a JSON array.

    • Optionaloutbound_policy?: "ACCEPT" | "DROP"

      The default behavior for outbound traffic. This setting can be overridden by updating the outbound.action property of the Firewall Rule.

    • Optional Readonlyversion?: number

      Read-only The firewall's rule version. The first version is 1. The version number is incremented when the firewall's rules change.

    • Optionalinbound?: unknown
    • Optionaloutbound?: unknown
    path: { firewallId: number }

    Type Declaration

    • firewallId: number

      ID of the Firewall to access.

    query?: never
    url: "networking/firewalls/{firewallId}/rules"