List the set of enhanced_firewall_policy in a namespace.
| Tool | Description |
|---|
f5xc-api-virtual-enhanced-firewall-policy-create | Create Enhanced Firewall Policy. |
f5xc-api-virtual-enhanced-firewall-policy-get | GET Enhanced Firewall Policy. |
f5xc-api-virtual-enhanced-firewall-policy-list | List Enhanced Firewall Policy. |
f5xc-api-virtual-enhanced-firewall-policy-update | Replace Enhanced Firewall Policy. |
f5xc-api-virtual-enhanced-firewall-policy-delete | DELETE Enhanced Firewall Policy. |
| Parameter | Description | Example |
|---|
metadata.namespace | Namespace | - |
name | Name | - |
namespace | Namespace | - |
metadata.name | Name | - |
| Parameter | Description | Example |
|---|
response_format | The format in which the configuration object is to be fetched. This could be for example | - |
label_filter | A LabelSelectorType expression that every item in list response will satisfy. | - |
report_fields | The report_fields parameter | - |
report_status_fields | The report_status_fields parameter | - |
This resource includes mutually exclusive configuration options:
| Option | Description | Recommended |
|---|
spec.allow_all | - | |
spec.allowed_destinations | - | |
spec.allowed_sources | - | |
spec.denied_destinations | - | |
spec.denied_sources | - | |
spec.deny_all | - | |
spec.rule_list | - | |
| Option | Description | Recommended |
|---|
spec.rule_list.rules[].allow | - | |
spec.rule_list.rules[].deny | - | |
spec.rule_list.rules[].insert_service | - | |
| Option | Description | Recommended |
|---|
spec.rule_list.rules[].all_destinations | - | |
spec.rule_list.rules[].all_sli_vips | - | |
spec.rule_list.rules[].all_slo_vips | - | |
spec.rule_list.rules[].destination_aws_vpc_ids | - | |
spec.rule_list.rules[].destination_ip_prefix_set | - | |
spec.rule_list.rules[].destination_label_selector | - | |
spec.rule_list.rules[].destination_prefix_list | - | |
spec.rule_list.rules[].inside_destinations | - | |
spec.rule_list.rules[].outside_destinations | - | |
| Option | Description | Recommended |
|---|
spec.rule_list.rules[].all_sources | - | |
spec.rule_list.rules[].inside_sources | - | |
spec.rule_list.rules[].outside_sources | - | |
spec.rule_list.rules[].source_aws_vpc_ids | - | |
spec.rule_list.rules[].source_ip_prefix_set | - | |
spec.rule_list.rules[].source_label_selector | - | |
spec.rule_list.rules[].source_prefix_list | - | |
| Option | Description | Recommended |
|---|
spec.rule_list.rules[].all_tcp_traffic | - | |
spec.rule_list.rules[].all_traffic | - | |
spec.rule_list.rules[].all_udp_traffic | - | |
spec.rule_list.rules[].applications | - | |
spec.rule_list.rules[].protocol_port_range | - | |
Ask Claude to help you work with Enhanced Firewall Policy resources:
“Create a enhanced-firewall-policy named ‘example’ in the ‘production’ namespace”
“List all enhanced-firewall-policys in the ‘production’ namespace”
“Get details of the enhanced-firewall-policy named ‘example’ in namespace ‘production‘“
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
curl -X POST "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json" \
-d @enhanced_firewall_policy.json
curl -X DELETE "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/enhanced_firewall_policys/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}"