@akamai/openapi-ts
    Preparing search index...

    Variable getFirewallRulesResponseSchemaConst

    getFirewallRulesResponseSchema: ZodObject<
        {
            fingerprint: ZodReadonly<ZodString>;
            inbound: ZodArray<
                ZodObject<
                    {
                        action: ZodEnum<{ ACCEPT: "ACCEPT"; DROP: "DROP" }>;
                        addresses: ZodObject<
                            { ipv4: ZodArray<ZodString>; ipv6: ZodArray<ZodString> },
                            $strip,
                        >;
                        description: ZodString;
                        label: ZodString;
                        ports: ZodUnion<readonly [ZodString, ZodNull]>;
                        protocol: ZodEnum<
                            { ICMP: "ICMP"; IPENCAP: "IPENCAP"; TCP: "TCP"; UDP: "UDP" },
                        >;
                    },
                    $strip,
                >,
            >;
            inbound_policy: ZodEnum<{ ACCEPT: "ACCEPT"; DROP: "DROP" }>;
            outbound: ZodArray<
                ZodObject<
                    {
                        action: ZodEnum<{ ACCEPT: "ACCEPT"; DROP: "DROP" }>;
                        addresses: ZodObject<
                            { ipv4: ZodArray<ZodString>; ipv6: ZodArray<ZodString> },
                            $strip,
                        >;
                        description: ZodString;
                        label: ZodString;
                        ports: ZodUnion<readonly [ZodString, ZodNull]>;
                        protocol: ZodEnum<
                            { ICMP: "ICMP"; IPENCAP: "IPENCAP"; TCP: "TCP"; UDP: "UDP" },
                        >;
                    },
                    $strip,
                >,
            >;
            outbound_policy: ZodEnum<{ ACCEPT: "ACCEPT"; DROP: "DROP" }>;
            version: ZodReadonly<ZodInt>;
        },
        $strip,
    > = ...

    The inbound and outbound access rules to apply to the Firewall.

    A Firewall may have up to 25 rules across its inbound and outbound rulesets.

    Multiple rules are applied in order. If two rules conflict, the first rule takes precedence. For example, if the first rule accepts inbound traffic from an address, and the second rule drops inbound traffic the same address, the first rule applies and inbound traffic from that address is accepted.