Creates multiple firewall rules for a simple application server at a time.
Operation description
Firewalls serve to control network access to simple application servers and isolate security domains in the cloud. By default, SSH port 22, HTTP port 80, and HTTPS port 443 are enabled for simple application servers. Other ports are disabled. You can add firewall rules to enable more ports.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
swas-open:CreateFirewallRules |
create |
*FirewallRule
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| InstanceId |
string |
Yes |
The ID of the simple application server. |
ace0706b2ac4454d984295a94213**** |
| RegionId |
string |
Yes |
The region ID of the simple application server. You can call the ListRegions operation to query the most recent region list. |
cn-hangzhou |
| ClientToken |
string |
No |
The client token. |
123e4567-e89b-12d3-a456-426655440000 |
| FirewallRules |
array<object> |
No |
Details about the firewall rules. |
|
|
object |
No |
Details about the firewall rules. |
||
| RuleProtocol |
string |
No |
The transport layer protocol. Valid values:
|
TCP |
| Port |
string |
No |
The port number.
|
3306 |
| SourceCidrIp |
string |
No |
The IP address or CIDR block that is allowed in the firewall rule. |
47.101.XX.XX |
| Remark |
string |
No |
The description of the firewall rule. |
自定义的防火墙规则 |
| Tag |
array<object> |
No |
The tags that you want to add to the firewall. You can specify up to 20 tags. |
|
|
object |
No |
The tags of the firewall rule. |
||
| Key |
string |
No |
The tag key. Valid values of N: 1 to 20. The tag key cannot be an empty string. The tag key can be up to 64 characters in length and cannot contain http:// or https://. The tag key cannot start with acs: or aliyun. |
TestKey |
| Value |
string |
No |
The tag value. Valid values of N: 1 to 20. The tag value can be an empty string. The tag value can be up to 64 characters in length and cannot contain http:// or https://. |
TestValue |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
|||
| RequestId |
string |
The request ID. |
20758A-585D-4A41-A9B2-28DA8F4F534F |
| FirewallRuleIds |
array |
The IDs of the firewall rules that you created. |
|
|
string |
The ID of the firewall rule that you created. |
1a16263ab0f541288312a15fa64280de |
Examples
Success response
JSON format
{
"RequestId": "20758A-585D-4A41-A9B2-28DA8F4F534F",
"FirewallRuleIds": [
"1a16263ab0f541288312a15fa64280de"
]
}
Error codes
|
HTTP status code |
Error code |
Error message |
Description |
|---|---|---|---|
| 400 | InvalidProtocol.ValueNotSupported | The specified parameter Protocol is invalid. | |
| 400 | InvalidPort.ValueNotSupported | The specified parameter Port is invalid. | |
| 400 | RegionIdNotMatchHost | The parameter regionId does not match the endpoint host. | |
| 500 | InternalError | An error occurred while processing your request. | |
| 403 | FirewallRuleLimitExceed | The maximum number of firewall rules in an instance is exceeded. | |
| 403 | FirewallRuleAlreadyExist | The specified Rule already exist | |
| 404 | InvalidInstanceId.NotFound | The specified InstanceId does not exist. |
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.