This API is used to create an ACL rule.
POST /v1/{project_id}/acl-rule
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
project_id |
Yes |
String |
Project ID |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
enterprise_project_id |
No |
String |
Enterprise project id, the id generated by the enterprise project after the user supports the enterprise project. |
fw_instance_id |
No |
String |
Firewall instance ID, which is automatically generated after a CFW instance is created. You can obtain the ID by calling the API used for querying a firewall instance. For details, see the API Explorer and Help Center FAQ.By default, if fw_instance_Id is not specified, information about the first firewall under the account is returned. If fw_instance_Id is specified, information about the firewall with this fw_instance_Id is returned.If object_Id is specified, information about the firewall with this object_Id is returned by default. If both fw_instance_Id and object_Id are specified, the specified object_Id must belong to the specified firewall. |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
X-Auth-Token |
Yes |
String |
User token. It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
object_id |
Yes |
String |
Protected object ID, which is used to distinguish Internet border protection from VPC border protection after a CFW instance is created. You can obtain the ID by calling the API used for querying a firewall instance. Note that the value 0 indicates the ID of a protected object on the Internet border, and the value 1 indicates the ID of a protected object on the VPC border. For details, see the API Explorer and Help Center FAQ. |
type |
Yes |
Integer |
Rule type. The value can be 0 (Internet rule), 1 (VPC rule), or 2 (NAT rule). Enumeration values:
|
rules |
Yes |
Array of rules objects |
rules |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
name |
Yes |
String |
Rule name |
sequence |
Yes |
OrderRuleAclDto object |
Rule sequence |
address_type |
Yes |
Integer |
Address type. The value can be 0 (IPv4), 1 (IPv6), or 2 (domain). Enumeration values:
|
action_type |
Yes |
Integer |
Action. 0: allow; 1: deny |
status |
Yes |
Integer |
Rule delivery status. 0: disabled; 1: enabled. Enumeration values:
|
applications |
No |
Array of strings |
applications |
applicationsJsonString |
No |
String |
applications json string |
long_connect_time |
No |
Long |
Persistent connection duration |
long_connect_time_hour |
No |
Long |
Persistent connection duration (hour) |
long_connect_time_minute |
No |
Long |
Persistent connection duration (minute) |
long_connect_time_second |
No |
Long |
Persistent Connection Duration (second) |
long_connect_enable |
Yes |
Integer |
Whether to support persistent connections. 0: not supported; 1: supported. Enumeration values:
|
description |
No |
String |
Description |
direction |
No |
Integer |
Direction: 0 means outside to inside, 1 means inside to outside, direction value is required when rule type is internet or nat. Enumeration values:
|
source |
Yes |
RuleAddressDtoForRequest object |
Source address transmission object |
destination |
Yes |
RuleAddressDtoForRequest object |
Destination address transmission object |
service |
Yes |
RuleServiceDto object |
Service object |
tag |
No |
TagsVO object |
Tag value |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
dest_rule_id |
No |
String |
ID of the rule that the added rule will follow. This parameter cannot be left blank if the rule is not pinned on top, and is empty when the added rule is pinned on top. |
top |
No |
Integer |
Whether to pin on top. The options are as follows: 0: no; 1: yes. |
bottom |
No |
Integer |
Whether to pin on bottom. The options are as follows: 0: no; 1: yes. |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
type |
Yes |
Integer |
Source type. 0: manual input; 1: associated IP address group; 2: domain name; 3: region; 4: domain set 5: multi object, 6: domain set dns, 7: domain url profile |
address_type |
No |
Integer |
Source type. 0: IPv4; 1: IPv6 |
address |
No |
String |
Source IP address. The value cannot be empty for the manual type, and cannot be empty for the automatic or domain type. |
address_set_id |
No |
String |
ID of the associated IP address group. The value cannot be empty for the automatic type or for the manual or domain type. |
address_set_name |
No |
String |
IP address group name |
domain_address_name |
No |
String |
Name of the domain name address. This parameter cannot be left empty for the domain name type, and is empty for the manual or automatic type. |
region_list_json |
No |
String |
JSON value of the rule region list. |
region_list |
No |
Array of IpRegionDto objects |
Region list of a rule |
domain_set_id |
No |
String |
domain set id |
domain_set_name |
No |
String |
domain set name |
ip_address |
No |
Array of strings |
IP address list |
address_set_type |
No |
Integer |
Address set type, 0 indicates a custom define address set, 1 indicates a WAF return-to-source IP address set, 2 indicates a DDoS return-to-source IP address set, and 3 indicates a NAT64 translation address set. |
predefined_group |
No |
Array of strings |
predefined group |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
region_id |
No |
String |
region id |
description_cn |
No |
String |
cn description |
description_en |
No |
String |
en description |
region_type |
No |
Integer |
Region type, 0 means country, 1 means province, 2 means continent |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
type |
Yes |
Integer |
Service input type. The value 0 indicates manual input, and the value 1 indicates automatic input. |
protocol |
No |
Integer |
Protocol type. The value 6 indicates TCP, 17 indicates UDP, 1 indicates ICMP, 58 indicates ICMPv6, and -1 indicates any protocol. Regarding the addition type, a null value indicates it is automatically added. |
protocols |
No |
Array of integers |
Protocols |
source_port |
No |
String |
Source port |
dest_port |
No |
String |
Destination port |
service_set_id |
No |
String |
Service group ID. This parameter is left blank for the manual type and cannot be left blank for the automatic type. |
service_set_name |
No |
String |
Service group name |
custom_service |
No |
Array of ServiceItem objects |
custom service |
predefined_group |
No |
Array of strings |
predefined group |
service_group |
No |
Array of strings |
Service group list |
service_group_names |
No |
Array of ServiceGroupVO objects |
Service group name list |
service_set_type |
No |
Integer |
Service set type, 0 indicates a custom service set, 1 indicates a predefined service set, 2 indicates commonly used remote login and PING, 3 indicates commonly used databases |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
protocol |
No |
Integer |
Protocol type. The value 6 indicates TCP, 17 indicates UDP, 1 indicates ICMP, 58 indicates ICMPv6, and -1 indicates any protocol. Regarding the addition type, a null value indicates it is automatically added. |
source_port |
No |
String |
source port |
dest_port |
No |
String |
destination port |
description |
No |
String |
description |
name |
No |
String |
name |
Status code: 200
Parameter |
Type |
Description |
---|---|---|
data |
RuleIdList object |
Rule ID list |
Status code: 400
Parameter |
Type |
Description |
---|---|---|
error_code |
String |
Error code Minimum: 8 Maximum: 36 |
error_msg |
String |
Description Minimum: 2 Maximum: 512 |
The following example shows how to add an IPv4 inbound rule. The rule name is TestRule, the source is the IP address 1.1.1.1, the destination is the IP address 2.2.2.2, the service type is service, the protocol type is TCP, the source port is 0, and the destination port is 0. Persistent connections are not supported. The action is to allow. The status is enabled.
https://{Endpoint}/v1/9d80d070b6d44942af73c9c3d38e0429/acl-rule { "object_id" : "ae42418e-f077-41a0-9d3b-5b2f5ad9102b", "rules" : [ { "name" : "TestRule", "status" : 1, "action_type" : 0, "description" : "", "source" : { "type" : 0, "address" : "1.1.1.1" }, "destination" : { "type" : 0, "address" : "2.2.2.2" }, "service" : { "type" : 0, "protocol" : 6, "source_port" : "0", "dest_port" : "0" }, "address_type" : 0, "tag" : { "tag_key" : "", "tag_value" : "" }, "long_connect_enable" : 0, "direction" : 0, "sequence" : { "top" : 1, "dest_rule_id" : null } } ], "type" : 0 }
Status code: 200
Response to the request for adding an ACL
{ "data" : { "rules" : [ { "id" : "0475c516-0e41-4caf-990b-0c504eebd73f" } ] } }
Status code: 400
Bad Request
{ "error_code" : "CFW.00900016", "error_msg" : "The import task is in progress. Please operate after the task is completed" }
Status Code |
Description |
---|---|
200 |
Response to the request for adding an ACL |
400 |
Bad Request |
401 |
Unauthorized |
403 |
Forbidden |
404 |
Not Found |
500 |
Internal Server Error |
See Error Codes.