A positive integer between [1, Int32.MaxValue-1] that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.
A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.
Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
description
string
An optional string description of this rule. This field has a maximum length of 400 characters.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-06-16 UTC."],[[["\u003cp\u003eFirewall rules are evaluated based on priority, with lower priority numbers being evaluated first, and a default rule at the highest priority matches all unmatched traffic.\u003c/p\u003e\n"],["\u003cp\u003eEach firewall rule specifies an \u003ccode\u003eaction\u003c/code\u003e (either \u003ccode\u003eALLOW\u003c/code\u003e or \u003ccode\u003eDENY\u003c/code\u003e) to be taken on matched requests, which is determined by the \u003ccode\u003esourceRange\u003c/code\u003e, and the \u003ccode\u003eaction\u003c/code\u003e can be modified by the user on the highest priority rule.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003esourceRange\u003c/code\u003e field defines the IP addresses or ranges, using CIDR notation, to which the rule applies, and can use "*" to match all IPs.\u003c/p\u003e\n"],["\u003cp\u003eFirewall rules can be managed through various methods, including creating, deleting, getting, listing, updating individual rules or updating all the ruleset, and replacing the entire set of rules in a single bulk operation.\u003c/p\u003e\n"],["\u003cp\u003eThe rules can have an optional description of a maximum of 400 characters.\u003c/p\u003e\n"]]],[],null,[]]