get
https://connect-eu1.jotelulu.com/servers/v1/subscriptions//networks//firewalls/inbounds/rules
Retrieve all inbound firewall rules configured for a specific isolated network.
This endpoint provides comprehensive information about firewall rules including protocol configurations, port mappings, source IP restrictions, and rule identifiers. Essential for security auditing and network access management.
Use Cases:
- Security Auditing: Review all inbound access rules for compliance
- Network Troubleshooting: Diagnose connectivity issues and rule conflicts
- Access Management: Monitor and validate network access policies
- Compliance Reporting: Generate security reports for regulatory requirements
Rule Information:
- Protocol-specific configurations (TCP, UDP, ICMP)
- Port forwarding mappings and source IP restrictions
- Rule identifiers for management and modification
- Network interface associations and routing details
Security Management:
- Monitor firewall rule effectiveness and coverage
- Plan additional security rules and access controls
- Validate network security posture and policies