Update firewall rules for a firewall group

Modify or add rules to an existing firewall group. You can adjust settings like ports, protocols, and rule enablement to control network traffic to your services.

VPS Services Firewall

Context

Path Parameters

id string required Example: 9294162d-47c2-45b0-941e-f4ac43629835

UUID for id

Headers

Accept Example
Content-Type Example

Body

required
application/json
description string required · Example: Allows inbound SSH access and Minecraft server traffic (TCP 25565–25580). All other inb...
name string required · Example: main
rules array required · Example: [{"id":"6a0e4e1e-8695-4dea-b069-6b399552bd56","type":"in","action":"ACCEPT","enable":tr...

Responses

200
data object required
data.id string required · Example: 9294162d-47c2-45b0-941e-f4ac43629835
data.message string required · Example: Firewall group updated successfully

Human-readable message.

requestId string required · Example: 2121ae20-bd9d-41e9-aeeb-5dd1dd1a24ba

Unique request identifier (UUID).

success boolean required · Example: true

True for successful responses.

timestamp string required · Example: 2026-02-10T00:00:00.000Z

ISO 8601 timestamp (UTC).

500

No response body

PUT https://cloud.hostup.se/api/firewall-groups/{id}
For AI assistants
cURL
curl -X PUT "https://cloud.hostup.se/api/firewall-groups/9294162d-47c2-45b0-941e-f4ac43629835" \
  -H "X-API-Key: YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "main",
    "description": null,
    "rules": [
      {
        "id": "6a0e4e1e-8695-4dea-b069-6b399552bd56",
        "type": "in",
        "action": "ACCEPT",
        "enable": true,
        "pos": 0,
        "proto": "tcp",
        "dport": "22",
        "sport": null,
        "source": null,
        "dest": null,
        "comment": "SSH",
        "iface": null,
        "macro": null,
        "created_at": "2026-02-10T00:00:00.000Z",
        "updated_at": "2026-02-10T00:00:00.000Z"
      },
      {
        "id": "ee2771c5-3fad-4f15-b034-5d1487c27723",
        "type": "in",
        "action": "ACCEPT",
        "enable": true,
        "pos": 1,
        "proto": "tcp",
        "dport": "443",
        "sport": null,
        "source": null,
        "dest": null,
        "comment": "HTTPS",
        "iface": null,
        "macro": null,
        "created_at": "2026-02-10T00:00:00.000Z",
        "updated_at": "2026-02-10T00:00:00.000Z"
      },
      {
        "_truncated": "... and 4 more items"
      }
    ]
  }'
Response
{
  "success": true,
  "timestamp": "2026-02-10T00:00:00.000Z",
  "requestId": "2121ae20-bd9d-41e9-aeeb-5dd1dd1a24ba",
  "data": {
    "message": "Firewall group updated successfully",
    "id": "9294162d-47c2-45b0-941e-f4ac43629835"
  }
}
Request Body Example 1
{
  "name": "main",
  "description": null,
  "rules": [
    {
      "id": "6a0e4e1e-8695-4dea-b069-6b399552bd56",
      "type": "in",
      "action": "ACCEPT",
      "enable": true,
      "pos": 0,
      "proto": "tcp",
      "dport": "22",
      "sport": null,
      "source": null,
      "dest": null,
      "comment": "SSH",
      "iface": null,
      "macro": null,
      "created_at": "2026-02-10T00:00:00.000Z",
      "updated_at": "2026-02-10T00:00:00.000Z"
    },
    {
      "id": "ee2771c5-3fad-4f15-b034-5d1487c27723",
      "type": "in",
      "action": "ACCEPT",
      "enable": true,
      "pos": 1,
      "proto": "tcp",
      "dport": "443",
      "sport": null,
      "source": null,
      "dest": null,
      "comment": "HTTPS",
      "iface": null,
      "macro": null,
      "created_at": "2026-02-10T00:00:00.000Z",
      "updated_at": "2026-02-10T00:00:00.000Z"
    },
    {
      "_truncated": "... and 4 more items"
    }
  ]
}