All Products
Search
Document Center

Simple Application Server:CreateFirewallRules

Last Updated:Jan 15, 2026

Creates multiple firewall rules for a simple application server at a time.

Operation description

Firewalls serve to control network access to simple application servers and isolate security domains in the cloud. By default, SSH port 22, HTTP port 80, and HTTPS port 443 are enabled for simple application servers. Other ports are disabled. You can add firewall rules to enable more ports.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

swas-open:CreateFirewallRules

create

*FirewallRule

acs:swas-open:{#regionId}:{#accountId}:firewallrule/*

None None

Request parameters

Parameter

Type

Required

Description

Example

InstanceId

string

Yes

The ID of the simple application server.

ace0706b2ac4454d984295a94213****

RegionId

string

Yes

The region ID of the simple application server. You can call the ListRegions operation to query the most recent region list.

cn-hangzhou

ClientToken

string

No

The client token.

123e4567-e89b-12d3-a456-426655440000

FirewallRules

array<object>

No

Details about the firewall rules.

object

No

Details about the firewall rules.

RuleProtocol

string

No

The transport layer protocol. Valid values:

  • TCP

  • UDP

  • TCP+UDP

  • ICMP

TCP

Port

string

No

The port number.

  • When the transport layer protocol is TCP and/or UDP, the port number range is 1 to 65535. Specify a port range in the format of <Start port number>/<End port number>. Example: 1/200.

  • When the transport layer protocol is ICMP, the port number range is -1/-1, which indicates all ports.

3306

SourceCidrIp

string

No

The IP address or CIDR block that is allowed in the firewall rule.

47.101.XX.XX

Remark

string

No

The description of the firewall rule.

自定义的防火墙规则

Tag

array<object>

No

The tags that you want to add to the firewall. You can specify up to 20 tags.

object

No

The tags of the firewall rule.

Key

string

No

The tag key. Valid values of N: 1 to 20.

The tag key cannot be an empty string. The tag key can be up to 64 characters in length and cannot contain http:// or https://. The tag key cannot start with acs: or aliyun.

TestKey

Value

string

No

The tag value. Valid values of N: 1 to 20.

The tag value can be an empty string. The tag value can be up to 64 characters in length and cannot contain http:// or https://.

TestValue

Response elements

Element

Type

Description

Example

object

RequestId

string

The request ID.

20758A-585D-4A41-A9B2-28DA8F4F534F

FirewallRuleIds

array

The IDs of the firewall rules that you created.

string

The ID of the firewall rule that you created.

1a16263ab0f541288312a15fa64280de

Examples

Success response

JSON format

{
  "RequestId": "20758A-585D-4A41-A9B2-28DA8F4F534F",
  "FirewallRuleIds": [
    "1a16263ab0f541288312a15fa64280de"
  ]
}

Error codes

HTTP status code

Error code

Error message

Description

400 InvalidProtocol.ValueNotSupported The specified parameter Protocol is invalid.
400 InvalidPort.ValueNotSupported The specified parameter Port is invalid.
400 RegionIdNotMatchHost The parameter regionId does not match the endpoint host.
500 InternalError An error occurred while processing your request.
403 FirewallRuleLimitExceed The maximum number of firewall rules in an instance is exceeded.
403 FirewallRuleAlreadyExist The specified Rule already exist
404 InvalidInstanceId.NotFound The specified InstanceId does not exist.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.