InlineFirewallSection1
{
"autoplumbed": false,
"category": "string",
"comments": "string",
"enforced_on": "string",
"firewall_schedule": {
"is_valid": false,
"target_display_name": "string",
"target_id": "string",
"target_type": "string"
},
"lock_modified_by": "string",
"lock_modified_time": 0,
"locked": false,
"priority": 0,
"tcp_strict": false
}
This flag indicates whether it is an auto-plumbed section that is associated to a LogicalRouter. Auto-plumbed sections are system owned and cannot be updated via the API.
Category from policy framework.
Comments for section lock/unlock.
This attribute represents enforcement point of firewall section. For example, firewall section enforced on logical port with attachment type bridge endpoint will have 'BRIDGEENDPOINT' value, firewall section enforced on logical router will have 'LOGICALROUTER' value and rest have 'VIF' value.
ID of the user who last modified the lock for the section.
Section locked/unlocked time in epoch milliseconds.
Section is locked/unlocked.
Priority of current section with respect to other sections. In case the field is empty, the list section api should be used to get section priority.
If TCP strict is enabled on a section and a packet matches rule in it, the following check will be performed. If the packet does not belong to an existing session, the kernel will check to see if the SYN flag of the packet is set. If it is not, then it will drop the packet.