NSX-T Data Center REST API
Revise the positioning of bridge firewall rule
This is used to re-order a bridge firewall rule within a bridge firewall policy.Request:
Method:
POST
URI Path(s):
/policy/api/v1/infra/domains/{domain-id}/bridge-policies/{bridge-firewall-policy-id}/rules/{rule-id}
Request Headers:
n/a
Query Parameters:
BridgeFirewallRuleInsertParameters
Request Body:
Rule+
Example Request:
POST https://<policy-mgr>/policy/api/v1/infra/domains/default/bridge-policies/bridge_firewall_policy_test/rules/bridge_firewall_rule_test?anchor_path=/infra/domains/default/bridge-policies/bridge_firewall_policy_test/rules/bridge_firewall_rule_test_revised&operation=insert_top { "action": "ALLOW", "display_name": "Bridge_Firewall_Rule_Test_Revised", "description": "Bridge Firewall Rule Test Revised", "sources_excluded": false, "destinations_excluded": false, "source_groups": [ "/infra/domains/default/groups/a8b7ddce-a5d6-11e8-a7e5-43344e310957", "10.10.10.1" ], "destination_groups": [ "/infra/domains/default/groups/7e8d14d0-ae7a-4bf2-b3e2-74a8c2d92347", "10.10.10.2" ], "services": [ "/infra/services/DNS-IN", "/infra/services/EdgeSync_service-ADAM", "/infra/services/Enterprise_Manager_RMI_port" ], "profiles": [ "/infra/context-profiles/360ANTIV", "/infra/context-profiles/AVAST", "/infra/context-profiles/CIFS" ], "logged": false, "scope": [ "/infra/segments/segment_test" ] }Successful Response:
Response Code:
200 OK
Response Headers:
Content-type: application/json
Response Body:
Rule+