Skip to content

firewall_filter_stats

Overview

This resource provides Firewall Filter Stats

Version information

Version : v2

URI scheme

Host :
BasePath : /sdwan/nitro/v2/monitor/
Schemes : HTTP

Tags

  • firewall_filter_stats : Operations related to firewall_filter_stats

Paths

Get operation for firewall_filter_stats

GET /firewall_filter_stats

Description

Use this operation to get the Firewall Filter Stats, max_stats filter is available as an additional option to filter the count(50/100/1000). Refer Getting Started Guide where filtering is explained via example of flow summary with max stats filter for monitoring API. Pagination is not supported for this API

Responses

HTTP Code Description Schema
200 API Successfully executed firewall_filter_stats_response_schema
400 Failed: bad input parameter ErrorSchema
401 Unauthorized: Failed Authentication ErrorSchema
403 Unauthorized: Forbidden ErrorSchema
405 Failed: Data format unacceptable ErrorSchema
415 Failed: Data format unacceptable ErrorSchema
500 Failed: Internal Server Error ErrorSchema

Produces

  • application/json

Tags

  • firewall_filter_stats

Definitions

ErrorSchema

Name Schema
errorcode
optional
integer
errormessage
optional
string

action

The action this policy takes on a possible match

Type : string

allow_fragments

Indicates whether fragments matching this filter are allowed

Type : enum (0, 1)

application_name

Application for this policy

Type : string

bytes

Total bytes that have matched this policy

Type : string

destination_firewall_zone_name

The responding zone used by this policy

Type : string

destination_ip_address

Destination IP Address for the policy

Type : string

destination_port_or_icmp_type

Responding port ot ICMP code used by this policy

Type : string

destination_service_name

Destination Service name for the policy

Type : string

destination_service_type

Destination Service type for the policy

Type : string

dpi_application_name

The application for the policy

Type : string

dpi_family_name

The family for the policy

Type : string

dscp

DSCP tag used by the policy

Type : string

firewall_filter_stats_delete_success_schema

Name Schema
firewall_filter_stats
optional
firewall_filter_stats

firewall_filter_stats

Name Description Schema
message
optional
Example : "resource deleted succesfully" string

firewall_filter_stats_post_success_schema

Name Schema
firewall_filter_stats
optional
firewall_filter_stats

firewall_filter_stats

Name Description Schema
message
optional
Example : "resource added succesfully" string

firewall_filter_stats_put_success_schema

Name Schema
firewall_filter_stats
optional
firewall_filter_stats

firewall_filter_stats

Name Description Schema
message
optional
Example : "resource modified succesfully" string

firewall_filter_stats_response_schema

Type : < firewall_filter_stats_response_schema > array

firewall_filter_stats_response_schema

Name Schema
action
optional
action
allow_fragments
optional
allow_fragments
application_name
optional
application_name
bytes
optional
bytes
destination_firewall_zone_name
optional
destination_firewall_zone_name
destination_ip_address
optional
destination_ip_address
destination_port_or_icmp_type
optional
destination_port_or_icmp_type
destination_service_name
optional
destination_service_name
destination_service_type
optional
destination_service_type
dpi_application_name
optional
dpi_application_name
dpi_family_name
optional
dpi_family_name
dscp
optional
dscp
ip_protocol
optional
ip_protocol
log_connection_end
optional
log_connection_end
log_connection_start
optional
log_connection_start
match_established
optional
match_established
packets
optional
packets
port_or_icmp_type
optional
port_or_icmp_type
routing_domain_name
optional
routing_domain_name
source_firewall_zone_name
optional
source_firewall_zone_name
source_ip_addr
optional
source_ip_addr
source_service_name
optional
source_service_name
source_service_type
optional
source_service_type
track_connection
optional
track_connection

ip_protocol

IP Protocol for the connection

Type : string

log_connection_end

Indicates whether the end of connection that match this policy are logged

Type : enum (0, 1)

log_connection_start

Indicates whether the start of connection that match this policy are logged

Type : enum (0, 1)

match_established

Indicates whether packets for an already established connection are matched

Type : enum (0, 1)

packets

Total packets that have matched this policy

Type : string

port_or_icmp_type

Originating port ot ICMP code used by this policy

Type : string

routing_domain_name

Routing Domain Name for the policy

Type : string

source_firewall_zone_name

The Originating zone used by this policy

Type : string

source_ip_addr

Source IP address for the policy

Type : string

source_service_name

Source Service Name for the policy

Type : string

source_service_type

Source Service Type for the policy

Type : string

track_connection

Indicates whether state of the connection matched are tracked

Type : enum (0, 1)