Get Firewall Inbound
Get the ordered list of firewall rules. Within the list of traffic rules, rules are processed in order of appearance, from top to bottom. When a connection matches a firewall rule, further processing for the connection stops, and the appliance ignores any additional firewall rules you have set.
Request
URLURL
Header Parameters
Header Parameters
Required session ID, acquired from Create Session API under CIS product
vmware-api-session-id example
"b00db39f948d13ea1e59b4d6fce56389"
Authentication
Response
Response BodyResponse Body
array
of
NetworkingFirewallInboundRule
of type application/json
List of address-based firewall rules.
[
{
"address": "string",
"interface_name": "string",
"policy": "IGNORE",
"prefix": 0
}
]
IPv4 or IPv6 address.
Inbound.Policy enumerated type Defines firewall rule policies.
IGNORE : Drop packet with correpsonding address.
ACCEPT : Allow packet with corresponding address.
REJECT : Drop packet with corresponding address sending destination is not reachable.
RETURN : Apply default or port-specific rules to packet with corresponding address.
Possible values are: IGNORE , ACCEPT , REJECT , RETURN
CIDR prefix used to mask address. For example, an IPv4 prefix of 24 ignores the low-order 8 bits of address.
The interface to which this rule applies. An empty string indicates that the rule applies to all interfaces.
Errors
‘Default’ means this response is used for all HTTP codes that are not covered individually for this operation.
Code Samples
cURL Command
Vendor Extensions
x-vmw-doc-deprecated-method: get
x-vmw-doc-deprecated-path: /rest/appliance/networking/firewall/inbound
x-vmw-doc-operation: get