Inbound Firewall Rules
Location in Dashboard: Security and SD-WAN
>> Configure
>> Firewall
Diagram
Classes
firewall (meraki.domains.organizations.networks.appliance)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
inbound_firewall_rules | Class | [inbound_firewall_rules] | No |
inbound_firewall_rules (meraki.domains.organizations.networks.appliance.firewall)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
rules | List | [rules] | No | |
syslog_default_rule | Boolean | true , false | No |
rules (meraki.domains.organizations.networks.appliance.firewall.inbound_firewall_rules)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
comment | String | min: 1 , max: 127 | No | |
policy | Choice | allow , deny | Yes | |
protocol | Choice | any , icmp , icmp6 , tcp , udp | Yes | |
source_port | Any | Integer[min: 0 , max: 65535 ] or String[matches: `(?:[1-9][0-9]3 | [1-5][0-9]4 | 6[0-4][0-9]3 |
source_cidr | String | Regex: ^(?i:any|(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?)(,(any|(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?))*$ | No | |
destination_port | Any | Integer[min: 0 , max: 65535 ] or String[matches: `(?:[1-9][0-9]3 | [1-5][0-9]4 | 6[0-4][0-9]3 |
destination_cidr | String | Regex: ^(?i:any|(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?)(,(any|(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?))*$ | No | |
syslog | Boolean | true , false | No |
Config Sample
meraki:
domains:
- name: EMEA
administrator:
name: Foo Bar
organizations:
- name: Dev
networks:
- name: Dev-main-cx-provider
product_types:
- appliance
- camera
- switch
- wireless
appliance:
firewall_inbound_firewall:
rules:
- comment: "Allow SSH"
policy: allow
protocol: tcp
source_port: Any
source_cidr: Any
destination_port: 22
destination_cidr: "192.168.1.0/24"
# syslog: true
# syslog_default_rule: true