Console API
  1. Network ACLs
Console API
  • User
    • User Info
      GET
    • Ssh keys
      GET
  • IAM
    • Add user to user group
      POST
    • Create user group
      POST
    • Get roles
      GET
    • Get all user groups v2
      GET
    • Create user group v2
      PUT
    • Detail user group v2
      GET
    • Update user group v2
      PUT
    • Delete a user group v2
      DELETE
    • Get roles v2
      GET
    • Detail role v2
      GET
    • Delete a Role v2
      DELETE
    • Get user list of all VPCs
      GET
  • Tenant / Regions
    • Get Regions & Tenant info
      GET
    • Get Tenant Info
      GET
  • Project
    • Get project list
    • Create Project
    • Detail Project
    • Delete Project
  • VPC
    • Get VPC List (Tenant Owner)
    • Get VPC List
    • Rename VPC
    • Create VPC
    • Delete VPC
    • Get VPC Quota
    • Check user can create VPC
    • Get VPCs of User v2
  • Images
    • Get images
  • Flavors
    • Get flavors
  • Storage Policy
    • List
  • Instances
    • List
    • Detail
    • Security Group
    • Create instance
    • Power off
    • Reboot
    • Power on
    • Terminate
    • Resize
    • Lock Termination
    • Rename
    • Manage tag
    • Check VPC enable NVME
    • Get Monitor performance url
  • Subnet
    • List
    • Create
    • Rename
    • Delete
    • Manage tags
  • Security group
    • Security Group List
    • Security Group Detail
    • Rule Types
    • Create Security Group
    • Create Rule
    • Apply to private ip
    • Delete Rule
    • Delete security group
    • Manage tag
    • Get application ports
    • Get quota Security Group
  • Floating IP
    • List
    • Allocate
    • Connect to instance
    • Disconnect
    • Release
    • Manage tag
  • Activity Logs
    • List
  • Tags
    • Lists
  • Billing
    • Bill
      • Get bills by date
      • Get Bills by paging
      • Bill Info
      • Bill service types
  • S3
    • Get bucket policy
    • List buckets
    • Get s3 service enabled
  • IP Access
    • API Portal Access Log
  • Metal Cloud
    • Bare Metal Servers
      • List all servers
      • Get server details
      • Get server console URL
      • Create server (V2)
      • Create server (V1)
      • Rename a server (Portal name)
      • Power on a server
      • Power off a server
      • Delete a server
    • Subnets
      • Get an available subnet
      • Create a subnet
      • List all subnets
      • Delete a subnet
      • Update a subnet
    • Network ACLs
      • List all network ACLs
        GET
      • Update a network ACL
        PATCH
      • Get a network ACL details
        GET
      • List all rule groups of a Network ACL
        GET
      • List all rules of a group (Network ACL)
        GET
      • Update a rule of a network ACL
        PUT
    • OS images
      • List all public images
      • List all custom images
      • Upload a new custom image to S3
      • Get presigned upload URLs
      • Upload a custom image from S3 to FPT image repository
      • Delete a custom image
      • Sync an image to Console (Portal)
    • Server flavors
      • Quota list
      • Get list server flavors
  • Storage Disk
    • Create Storage Disk
    • List Storages
    • Update
    • Create snapshot
    • Tagging
    • Attach
    • Detach
    • Delete
  • Instance Group
    • Create
    • Get policies
    • Get Instance groups
    • Delete
  • Instance Schedule
    • Create
    • List
    • Update instance apply
    • Detail
    • Delete
  • VPN
    • Create
    • List
    • Update instance apply
    • Detail
    • Delete
  • Task
    • Mark as read
  • Edge Gateway
    • Get list edge gateways
  • Schemas
    • Sample Schemas
      • CreateInstanceSchema
      • Pet
      • Category
      • Tag
    • Metal Cloud
      • Request
      • Bare Metal Server details
      • Subscription
      • Package details
      • Image
  1. Network ACLs

List all rules of a group (Network ACL)

GET
/api/v2/vmware/vpc/{vpc_id}/hpc/network-acls/{network_acl_id}/firewall-policies/{firewall_policy_id}/firewall-rules
Returns all of rules belong to a firewall policy (group of rules)
There are 2 types of rule groups:
Inbound (ingress) rules: An inbound rule permits servers to receive traffic from the specified IPv4 address ranges, the IP address ranges that are specified by a prefix list, or the servers that are associated with a destination Network ACL.
Outbound (egress) rules: An outbound rule permits servers to send traffic to the specified IPv4 address ranges, the IP address ranges specified by a prefix list, or the servers that are associated with a source Network ACL.
A default rule is automatically created with a NACL that allows all outbound traffic, and you can delete it.

Request

Authorization
Provide your bearer token in the
Authorization
header when making requests to protected resources.
Example:
Authorization: Bearer ********************
Path Params

Header Params

Request Code Samples

Shell
JavaScript
Java
Swift
Go
PHP
Python
HTTP
C
C#
Objective-C
Ruby
OCaml
Dart
R
Request Request Example
Shell
JavaScript
Java
Swift
curl --location --request GET '/api/v2/vmware/vpc//hpc/network-acls//firewall-policies//firewall-rules' \
--header 'OrgId;' \
--header 'UserId;' \
--header 'UserEmail;' \
--header 'sentry-trace;' \
--header 'Authorization: Bearer <token>'

Responses

🟢200Success
application/json
Body

Example
{"data":[{"id":"56e7a04e-0ced-4c0b-b492-de517519dacf","firewall_policy_id":"fdf5fc52-7853-4c66-a076-dd736d893432","firewall_group_id":"f88e9dc6-2744-4cf8-b23f-982308b46279","osp_firewall_rule_id":"45f7a96f-e332-4310-a294-331605a132ee","protocol":"All","port":"All","source_cidr":"10.0.0.0/24","destination_cidr":null,"traffic_action":"Allow","rule_number":1,"is_default":false,"status":"Active","type":"All","created_at":"2025-06-25T03:18:35","updated_at":"2025-06-25T03:18:35"},{"id":"48fa0150-653a-4d30-9076-9ba30b8c1cb8","firewall_policy_id":"fdf5fc52-7853-4c66-a076-dd736d893432","firewall_group_id":"f88e9dc6-2744-4cf8-b23f-982308b46279","osp_firewall_rule_id":"290441fc-d69c-4b84-ac9e-41dfc5caaacb","protocol":"All","port":"All","source_cidr":"103.160.74.28/31","destination_cidr":null,"traffic_action":"Allow","rule_number":2,"is_default":false,"status":"Active","type":"All","created_at":"2025-06-25T04:49:27","updated_at":"2025-06-25T04:49:27"},{"id":"1ae54fe8-642a-43d4-8b78-1d00dfa2934f","firewall_policy_id":"fdf5fc52-7853-4c66-a076-dd736d893432","firewall_group_id":"f88e9dc6-2744-4cf8-b23f-982308b46279","osp_firewall_rule_id":"0392e144-bf23-4e3c-adf4-984adb89b713","protocol":"TCP","port":"22","source_cidr":"103.160.74.29/32","destination_cidr":null,"traffic_action":"Allow","rule_number":3,"is_default":false,"status":"Active","type":"SSH","created_at":"2025-08-05T10:00:00","updated_at":"2025-08-05T10:00:00"},{"id":"8cdf782e-1bef-4735-a13c-65208db3ead1","firewall_policy_id":"fdf5fc52-7853-4c66-a076-dd736d893432","firewall_group_id":"f88e9dc6-2744-4cf8-b23f-982308b46279","osp_firewall_rule_id":"66e23807-51a4-4a63-9cce-23ae254cc47e","protocol":"TCP","port":"22","source_cidr":"103.160.79.2/32","destination_cidr":null,"traffic_action":"Allow","rule_number":4,"is_default":false,"status":"Active","type":"SSH","created_at":"2025-08-05T10:15:58","updated_at":"2025-08-05T10:15:58"},{"id":"79d3026c-da47-42af-81b4-ba0339393ba1","firewall_policy_id":"fdf5fc52-7853-4c66-a076-dd736d893432","firewall_group_id":"f88e9dc6-2744-4cf8-b23f-982308b46279","osp_firewall_rule_id":"042dc0b2-a474-4de0-88d5-e5493dc58c6d","protocol":"All","port":"All","source_cidr":"0.0.0.0/0","destination_cidr":null,"traffic_action":"Allow","rule_number":5,"is_default":false,"status":"Active","type":"All","created_at":"2025-08-11T14:38:22","updated_at":"2025-08-11T14:38:22"}],"total":5}
Modified at 2026-01-22 07:08:50
Previous
List all rule groups of a Network ACL
Next
Update a rule of a network ACL
Built with