Skip to content

firewall

Overview

API to add, modify, delete, and get configuration for Firewall settings

Version information

Version : v2

URI scheme

Host :
BasePath : /sdwan/nitro/v2/config_editor/
Schemes : HTTP

Tags

  • firewall : Operations related to firewall

Paths

POST operation for firewall

POST /firewall

Description

Use this operation to add the firewall settings

Parameters

Type Name Schema
Body body
optional
firewall_request_schema

Responses

HTTP Code Description Schema
200 Resource successfully added firewall_post_success_schema
400 Failed: bad input parameter ErrorSchema
401 Unauthorized: Failed Authentication ErrorSchema
403 Unauthorized: Forbidden ErrorSchema
405 Failed: Data format unacceptable ErrorSchema
415 Failed: Data format unacceptable ErrorSchema
500 Failed: Internal Server Error ErrorSchema

Consumes

  • application/json

Produces

  • application/json

Tags

  • firewall

Get operation for firewall

GET /firewall

Description

Use this operation to get the firewall settings

Responses

HTTP Code Description Schema
200 API Successfully executed firewall_response_schema
400 Failed: bad input parameter ErrorSchema
401 Unauthorized: Failed Authentication ErrorSchema
403 Unauthorized: Forbidden ErrorSchema
405 Failed: Data format unacceptable ErrorSchema
415 Failed: Data format unacceptable ErrorSchema
500 Failed: Internal Server Error ErrorSchema

Produces

  • application/json

Tags

  • firewall

PUT operation for firewall

PUT /firewall

Description

Use this operation to modify the firewall settings

Responses

HTTP Code Description Schema
200 Resource modified added firewall_put_success_schema
400 Failed: bad input parameter ErrorSchema
401 Unauthorized: Failed Authentication ErrorSchema
403 Unauthorized: Forbidden ErrorSchema
405 Failed: Data format unacceptable ErrorSchema
415 Failed: Data format unacceptable ErrorSchema
500 Failed: Internal Server Error ErrorSchema

Produces

  • application/json

Tags

  • firewall

DELETE operation for firewall

DELETE /firewall/{deletePathParam}

Description

Use this operation to delete the firewall settings

Parameters

Type Name Description Schema
Path deletePathParam
required
Object Primary Key for DELETE operation object

Responses

HTTP Code Description Schema
200 Resource delete added firewall_delete_success_schema
400 Failed: bad input parameter ErrorSchema
401 Unauthorized: Failed Authentication ErrorSchema
403 Unauthorized: Forbidden ErrorSchema
405 Failed: Data format unacceptable ErrorSchema
415 Failed: Data format unacceptable ErrorSchema
500 Failed: Internal Server Error ErrorSchema

Produces

  • application/json

Tags

  • firewall

Definitions

ErrorSchema

Name Schema
errorcode
optional
integer
errormessage
optional
string

firewall

Name Schema
firewall_destination_nat_policy
optional
firewall_destination_nat_policy
firewall_dynamic_nat_policy
optional
firewall_dynamic_nat_policy
firewall_local_policy
optional
firewall_local_policy
firewall_settings
optional
firewall_settings
firewall_static_nat_policy
optional
firewall_static_nat_policy
package_name
optional
package_name
site_name
optional
site_name

firewall_delete_success_schema

Name Schema
firewall
optional
firewall

firewall

Name Description Schema
message
optional
Example : "resource deleted succesfully" string

firewall_destination_nat_policy

Destination NAT Policy for firewall

Type : < firewall_destination_nat_policy > array

firewall_destination_nat_policy

Name Description Schema
direction
optional
The direction, from the Service or Virtual Interface perspective, the translation will operate.
Default : "outbound"
enum (inbound, outbound)
id
optional
Firewall destination NATs policy id integer
inside_network_ip_address
optional
The Inside IP Address and Prefix to translate (Destination IP Address in the direction selected). string
inside_port
optional
The Inside Port or port range to translate (Destination port/port range in the direction selected).
Default : "1-65535"
string
outside_network_ip_address
optional
The Outside IP Address packets will be translated to (Destination IP Address in the direction selected). string
outside_port
optional
The Outside Port packets will be translated to (Destination port in the direction selected(0: do not NAT the Port)). integer
priority
optional
read-only
The order/precedence in which Filters are applied (automatically redistributed). integer
service_name
optional
The Service Name that the translation applies to. string
service_type
optional
The Service Type that the translation applies to. enum (local, internet, intranet)

firewall_dynamic_nat_policy

Dynamic NAT Policy for firewall

Type : < firewall_dynamic_nat_policy > array

firewall_dynamic_nat_policy

Name Description Schema
allow_related
optional
To allow packets related to a Connection (ICMP error packets).
Default : false
boolean
bind_responder_route
optional
If enabled, the route for the responder's traffic will be bound to the Source Service.
Default : false
boolean
direction
optional
The direction, from the Service or Virtual Interface perspective, the translation will operate.
Default : "outbound"
enum (inbound, outbound)
enable_gre_pptp_passthrough
optional
To allow a GRE/PPTP session to be translated. Only a single session from the inside network will be permitted.
Default : false
boolean
enable_ipsec_passthrough
optional
To allow an IPsec (AH/ESP) session to be translated. Only a single session from the inside network will be permitted.
Default : false
boolean
id
optional
Firewall dynamic NATs policy id integer
inside_network_ip_address
optional
The Inside IP Address and Prefix to translate (Source IP Address in the direction selected). string
inside_zone
optional
The Inside Zone to translate.
Default : "any"
enum (any, Internet_Zone, Untrusted_Internet_Zone, Default_LAN_Zone)
outside_network_ip_address
optional
The Outside IP Address and Subnet Mask packets will be translated to (Source IP Address in the direction selected). string
outside_zone
optional
The Zone a packet must be destined for to allow translation. enum (Internet_Zone, Untrusted_Internet_Zone, Default_LAN_Zone)
port_forwarding_rules
optional
Port Forwarding Rules < port_forwarding_rules > array
port_parity
optional
If enabled, outside ports for NAT connections will maintain parity (even if inside port is even, odd if outside port is odd).
Default : false
boolean
priority
optional
read-only
The order/precedence in which Filters are applied (automatically redistributed). integer
service_name
optional
The Service Name that the translation applies to. string
service_type
optional
The Service Type that the translation applies to. enum (local, internet, intranet)
type
optional
The type of Dynamic NAT to perform.
Default : "port_restricted"
enum (port_restricted, symmetric)

port_forwarding_rules

Name Description Schema
allow_fragments
optional
To enable forwarding of packet fragments.
Default : true
boolean
inside_network_ip_address
optional
The Inside IP address to forward to. string
inside_port
optional
The Inside port or port range to forward to. If a range is configured, it must define the name number of ports as the Outside Port.
Default : "1-65535"
string
log_connection_end
optional
To generate a log when a Connection matching this Rule is deleted.
Default : false
boolean
log_connection_start
optional
To generate a log when a new Connection is created by a packet matching this Rule.
Default : false
boolean
log_interval
optional
The time, in seconds, between logging the number of packets matching the rule (0 = disabled, valid settings are 60-600). integer
outside_port
optional
The Outside port or port range to forward.
Default : "1-65535"
string
protocol
optional
The IP protocol to forward.
Default : "both"
enum (both, TCP, UDP)
track_connection
optional
Whether or not to enable bidirectional connection state tracking for TCP, UDP and ICMP packets matching this Rule. This feature will block flows which appear illegitimate, due to asymmetric routing or failure of checksum, protocol specific validation -- proceed with caution if NetScaler SD-WAN is not fully inline.
Default : true
boolean

firewall_local_policy

Local policy for firewall

Type : < firewall_local_policy > array

firewall_local_policy

Name Description Schema
action
optional
The Action to take for each packet matching the Filter.
Default : "allow"
enum (allow, drop, reject, count_and_continue)
allow_fragments
optional
To allow fragmented packets matching the Filter.
Default : true
boolean
application
optional
The Application used as match criteria for this Filter. string
application_family
optional
The Application used as match criteria for this Filter. string
application_objects
optional
The Application used as match criteria for this Filter.
Default : "any"
string
destination_ip_address
optional
The Destination IP Address and Subnet Mask that the Filter will match. string
destination_port
optional
The Destination Port or Port Range that the Filter will match. integer
destination_service_name
optional
The Destination service that the filter will match
Default : "any"
string
destination_service_type
optional
The Destination Service Type that the Filter will match.
Default : "any"
enum (any, local, virtual_path, internet, intranet, gre_tunnel, lan_ipsec_tunnel, ip_host, multicast)
from_zones
optional
Select to filter on the zone the packet originated from
Default : "any"
enum (any, default_lan_zone, internet_zone, untrusted_internet_zone)
id
optional
Firewall local policy id integer
ip_dscp
optional
The time, in seconds, to wait for new packets before closing a UDP session that has not seen traffic in both directions.
Default : "ANY"
enum (ANY, DEFAULT, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef)
ip_protocol_num
optional
The IP Protocol that the Filter will match. integer
log_connection_end
optional
To generate a log when a Connection matching this Filter is deleted.
Default : false
boolean
log_connection_start
optional
To generate a log when a new Connection is created by a packet matching this Filter.
Default : false
boolean
log_interval
optional
The time, in seconds, between logging the number of packets matching the filter (0 = disabled, valid settings are 60-600). integer
match_established
optional
To match incoming packets for a Connection to which outgoing packets were allowed.
Default : false
boolean
match_type
optional
The Application used as match criteria for this Filter.
Default : "any;"
enum (ip_protocol, application, application_family, application_objects)
priority
optional
The order/precedence in which Filters are applied (automatically redistributed). integer
reverse_also
optional
Click the checkbox to automatically add a copy of this Filter with the Source and Destination settings reversed.
Default : false
boolean
source_ip_address
optional
The Source IP Address and Subnet Mask that the Filter will match. string
source_port
optional
The Source Port or Port Range that the Filter will match. integer
source_service_name
optional
The Source service that the filter will match
Default : "any"
string
source_service_type
optional
The Source Service Type that the Filter will match.
Default : "any"
enum (any, local, virtual_path, internet, intranet, gre_tunnel, lan_ipsec_tunnel, ip_host, multicast)
to_zones
optional
Select to filter on the zone the packet is destined to
Default : "any"
enum (any, default_lan_zone, internet_zone, untrusted_internet_zone)
track_connection
optional
Whether or not to enable bidirectional connection state tracking for TCP, UDP and ICMP packets matching this Filter. This feature will block flows which appear illegitimate, due to asymmetric routing or failure of checksum, protocol specific validation -- proceed with caution if NetScaler SD-WAN is not fully inline.
Default : true
boolean

firewall_post_success_schema

Name Schema
firewall
optional
firewall

firewall

Name Description Schema
message
optional
Example : "resource added succesfully" string

firewall_put_success_schema

Name Schema
firewall
optional
firewall

firewall

Name Description Schema
message
optional
Example : "resource modified succesfully" string

firewall_request_schema

Name Schema
firewall
optional
firewall

firewall_response_schema

Type : < firewall_response_schema > array

firewall_response_schema

Name Schema
firewall_destination_nat_policy
optional
firewall_destination_nat_policy
firewall_dynamic_nat_policy
optional
firewall_dynamic_nat_policy
firewall_local_policy
optional
firewall_local_policy
firewall_settings
optional
firewall_settings
firewall_static_nat_policy
optional
firewall_static_nat_policy
package_name
optional
package_name
site_name
optional
site_name

firewall_settings

Basic settings for firewall

Type : < firewall_settings > array

firewall_settings

Name Description Schema
default_firewall_action
optional
The action for packets that do not match a policy.
Default : "allow"
enum (allow, drop)
default_track_connection
optional
Whether or not to enable bidirectional connection state tracking for TCP, UDP and ICMP packets that do not match a filter policy or NAT rule. This feature will block flows which appear illegitimate, due to asymmetric routing or failure of checksum, protocol specific validation -- proceed with caution if NetScaler SD-WAN is not fully inline.
Default : true
boolean
generic_idle_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an active generic session. integer
generic_initial_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing a generic session that has not seen traffic in both directions. integer
icmp_idle_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an active ICMP session. integer
icmp_initial_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an ICMP session that has not seen traffic in both directions. integer
max_new_connections_per_source
optional
The maximum number of non-established Connections to allow per Source IP Address. 0 = unlimited. integer
policy_template_name
optional
This is the name of the Policy Template defined globally whose filters will be included in this site's collection of firewall filters. string
priority
optional
read-only
The order/precedence in which Filters are applied (automatically redistributed). integer
source_route_validation
optional
If enabled, packets will be dropped when received on an interface that differs from the packet's route, as determined by the Source IP address.
Default : false
boolean
tcp_closed_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an aborted TCP session. integer
tcp_closing_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing a TCP session after a request to terminate. integer
tcp_idle_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an active TCP session. integer
tcp_initial_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing a TCP session that has not completed a handshake. integer
tcp_timewait_seconds
optional
The time, in seconds, to wait for new packets before closing a terminated TCP session. integer
udp_idle_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing an active UDP session. integer
udp_initial_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing a UDP session that has not seen traffic in both directions. integer
untracked_and_denied_timeout_seconds
optional
The time, in seconds, to wait for new packets before closing Untracked or Denied Connections. integer

firewall_static_nat_policy

Static NAT Policy for firewall

Type : < firewall_static_nat_policy > array

firewall_static_nat_policy

Name Description Schema
bind_responder_route
optional
If enabled, the route for the responder's traffic will be bound to the Source Service.
Default : false
boolean
direction
optional
The direction, from the Service or Virtual Interface perspective, the translation will operate.
Default : "outbound"
enum (inbound, outbound)
id
optional
Firewall local policy id integer
inside_network_ip_address
optional
The Inside IP Address and Prefix to translate (Source IP Address in the direction selected). string
inside_zone
optional
The Zone a packet must be from to allow translation.
Default : "Internet_Zone"
enum (Internet_Zone, Untrusted_Internet_Zone, Default_LAN_Zone)
outside_network_ip_address
optional
The Outside IP Address and Subnet Mask packets will be translated to (Source IP Address in the direction selected). string
outside_zone
optional
The Zone a packet must be destined for to allow translation.
Default : "Default_LAN_Zone"
enum (Internet_Zone, Untrusted_Internet_Zone, Default_LAN_Zone)
priority
optional
read-only
The order/precedence in which Filters are applied (automatically redistributed). integer
service_name
optional
The Service Name that the translation applies to. string
service_type
optional
The Service Type that the translation applies to. enum (local, internet, intranet)

package_name

Config package name using which the firewall API operation should be performed.

Type : string

site_name

Site Name

Type : string

Was this article helpful?