Description

The getIntrusionRuleGroupList operation handles configuration related to IntrusionRuleGroup model. 
This API is only supported for Snort 3. This will allow the user to get all intrusion rule groups.

HTTP request

GET /api/fdm/v6/object/intrusionrulegroups

Query Parameters

Parameter Required Type Description
offset False integer An integer representing the index of the first requested object. Index starts from 0. If not specified, the returned objects will start from index 0
limit False integer An integer representing the maximum amount of objects to return. If not specified, the maximum amount is 10
sort False string The field used to sort the requested object list
filter False string The criteria used to filter the models you are requesting. It should have the following format: {key}{operator}{value}[;{key}{operator}{value}]. Supported operators are: "!"(not equals), ":"(equals), "~"(similar). Supported keys are: "isSystemDefined", "name", "fts". The "fts" filter can not be used with other filters.

Example

curl -X GET \
    --header "Accept: application/json" \
    --header "Authorization: Bearer ${ACCESS_TOKEN}" \
    "https://${HOST}:${PORT}/api/fdm/v6/object/intrusionrulegroups"
from bravado.requests_client import RequestsClient
from bravado.client import SwaggerClient


def get_client(host, token):
    http_client = RequestsClient()
    http_client.ssl_verify = False
    http_client.set_api_key(
        host,
        "Bearer {}".format(token),
        param_name="Authorization",
        param_in="header"
    )
    return SwaggerClient.from_url(
        "https://{}/apispec/ngfw.json".format(host),
        http_client=http_client,
        config={
            "validate_responses": False,
            "validate_swagger_spec": False
        }
    )


def get_intrusion_rule_group_list(client):
    return client.IntrusionPolicy.getIntrusionRuleGroupList(
    ).response().result


if __name__ == "__main__":
    host = "ftd.example.com"
    token = "access_token"
    client = get_client(host, token)


    get_intrusion_rule_group_list(client)