Skip to content

Enhanced Firewall Policy

List the set of enhanced_firewall_policy in a namespace.

ToolDescription
f5xc-api-virtual-enhanced-firewall-policy-createCreate Enhanced Firewall Policy.
f5xc-api-virtual-enhanced-firewall-policy-getGET Enhanced Firewall Policy.
f5xc-api-virtual-enhanced-firewall-policy-listList Enhanced Firewall Policy.
f5xc-api-virtual-enhanced-firewall-policy-updateReplace Enhanced Firewall Policy.
f5xc-api-virtual-enhanced-firewall-policy-deleteDELETE Enhanced Firewall Policy.
ParameterDescriptionExample
metadata.namespaceNamespace-
nameName-
namespaceNamespace-
metadata.nameName-
ParameterDescriptionExample
response_formatThe format in which the configuration object is to be fetched. This could be for example-
label_filterA LabelSelectorType expression that every item in list response will satisfy.-
report_fieldsThe report_fields parameter-
report_status_fieldsThe report_status_fields parameter-

This resource includes mutually exclusive configuration options:

OptionDescriptionRecommended
spec.allow_all-
spec.allowed_destinations-
spec.allowed_sources-
spec.denied_destinations-
spec.denied_sources-
spec.deny_all-
spec.rule_list-
OptionDescriptionRecommended
spec.rule_list.rules[].allow-
spec.rule_list.rules[].deny-
spec.rule_list.rules[].insert_service-
OptionDescriptionRecommended
spec.rule_list.rules[].all_destinations-
spec.rule_list.rules[].all_sli_vips-
spec.rule_list.rules[].all_slo_vips-
spec.rule_list.rules[].destination_aws_vpc_ids-
spec.rule_list.rules[].destination_ip_prefix_set-
spec.rule_list.rules[].destination_label_selector-
spec.rule_list.rules[].destination_prefix_list-
spec.rule_list.rules[].inside_destinations-
spec.rule_list.rules[].outside_destinations-
OptionDescriptionRecommended
spec.rule_list.rules[].all_sources-
spec.rule_list.rules[].inside_sources-
spec.rule_list.rules[].outside_sources-
spec.rule_list.rules[].source_aws_vpc_ids-
spec.rule_list.rules[].source_ip_prefix_set-
spec.rule_list.rules[].source_label_selector-
spec.rule_list.rules[].source_prefix_list-
OptionDescriptionRecommended
spec.rule_list.rules[].all_tcp_traffic-
spec.rule_list.rules[].all_traffic-
spec.rule_list.rules[].all_udp_traffic-
spec.rule_list.rules[].applications-
spec.rule_list.rules[].protocol_port_range-

Ask Claude to help you work with Enhanced Firewall Policy resources:

“Create a enhanced-firewall-policy named ‘example’ in the ‘production’ namespace”

“List all enhanced-firewall-policys in the ‘production’ namespace”

“Get details of the enhanced-firewall-policy named ‘example’ in namespace ‘production‘“

Terminal window
# List resources
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
# Get specific resource
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
# Create resource
curl -X POST "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json" \
-d @enhanced_firewall_policy.json
# Delete resource
curl -X DELETE "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}"