API Reference

List Network Firewall Rules

Retrieve all inbound firewall rules configured for a specific isolated network.

This endpoint provides comprehensive information about firewall rules including protocol configurations, port mappings, source IP restrictions, and rule identifiers. Essential for security auditing and network access management.

Use Cases:

  • Security Auditing: Review all inbound access rules for compliance
  • Network Troubleshooting: Diagnose connectivity issues and rule conflicts
  • Access Management: Monitor and validate network access policies
  • Compliance Reporting: Generate security reports for regulatory requirements

Rule Information:

  • Protocol-specific configurations (TCP, UDP, ICMP)
  • Port forwarding mappings and source IP restrictions
  • Rule identifiers for management and modification
  • Network interface associations and routing details

Security Management:

  • Monitor firewall rule effectiveness and coverage
  • Plan additional security rules and access controls
  • Validate network security posture and policies
Language
Credentials
Bearer
JWT
Click Try It! to start a request and see the response here!