FutureNet

NXR,WXRシリーズ

REST-API編

7. VPN設定

7-1. IPsec設定(ipsec,acl_ipsec)

 処理概要

IPsec設定に関する処理を実行します。

 

URIおよびメソッド

機能 Version URI メソッド
POST PUT GET DELETE
IPsec v2 /api/v2/ipsec
/api/v2/ipsec/global
/api/v2/ipsec/ipsec-local-policy
/api/v2/ipsec/ipsec-local-policy/local-policy
/api/v2/ipsec/ipsec-local-policy/local-policy/{NUM}
/api/v2/ipsec/ipsec-isakmp-policy
/api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
/api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/{NUM}
/api/v2/ipsec/ipsec-tunnel-policy
/api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
/api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/{NUM}
/api/v2/acl_ipsec
/api/v2/acl_ipsec/access-list
/api/v2/acl_ipsec/access-list/{NAME}

凡例:〇対応、-未対応

  • api/v1は対応していません。

 

実行例

IPsecグローバル設定の更新

メソッド URI
PUT /api/v2/ipsec/global
  • Bodyを指定しなかった場合、設定を削除します。

 

JSON
リクエスト

POST /api/v2/ipsec/global
Content-Type: application/json

 

{
"global": {
"nat-traversal": "enable",
"priority-ignore": "enable"
}
}

 

レスポンス

204 No content

 

XML
リクエスト

POST /api/v2/ipsec/global
Content-Type: application/xml

 

<ipsec>
<global>
<nat-traversal>enable</nat-traversal>
<priority-ignore>enable</priority-ignore>
</global>
</ipsec>

 

レスポンス

204 No content

 

IPsecグローバル設定の取得

メソッド URI
GET /api/v2/ipsec/global
JSON
リクエスト

GET /api/v2/ipsec/global
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"global": {
"nat-traversal": "enable",
"priority-ignore": "enable"
}
}

 

XML
リクエスト

GET /api/v2/ipsec/global
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<ipsec>
<global>
<nat-traversal>enable</nat-traversal>
<priority-ignore>enable</priority-ignore>
</global>
</ipsec>

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/global
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec nat-traversal enable
ipsec priority-ignore enable

 

IPsecローカルポリシー設定の作成

メソッド URI
POST /api/v2/ipsec/ipsec-local-policy/local-policy
JSON
リクエスト

POST /api/v2/ipsec/ipsec-local-policy/local-policy
Content-Type: application/json

 

{
"local-policy": {
"number": 1,
"local-address": {
"address-family": "ip"
}
}
}

 

レスポンス

201 Created

 

XML
リクエスト

POST /api/v2/ipsec/ipsec-local-policy/local-policy
Content-Type: application/xml

 

<ipsec-local-policy>
<local-policy>
<number>1</number>
<local-address>
<address-family>ip</address-family>
</local-address>
</local-policy>
</ipsec-local-policy>

 

レスポンス

201 Created

 

全IPsecローカルポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-local-policy/local-policy
JSON
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"local-policy": [
{
"number": 1,
"local-address": {
"address-family": "ip"
},
"self-identity": {
"type": "fqdn",
"id": "nxr"
}
},
{
"number": 2,
・・・・・

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<ipsec-local-policy>
<local-policy>
<number>1</number>
<local-address>
<address-family>ip</address-family>
</local-address>
<self-identity>
<type>fqdn</type>
<id>nxr</id>
</self-identity>
</local-policy>
<local-policy>
<number>2</number>
・・・・・

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec local policy 1
address ip
self-identity fqdn nxr
ipsec local policy 2
・・・・・

 

IPsecローカルポリシー設定の更新

メソッド URI
PUT /api/v2/ipsec/ipsec-local-policy/local-policy/{NUM}
JSON
リクエスト

PUT /api/v2/ipsec/ipsec-local-policy/local-policy/1
Content-Type: application/json

 

{
"number": 1,
"local-address": {
"address-family": "ip"
},
"self-identity": {
"type": "fqdn",
"id": "nxr"
}
}

 

レスポンス

204 No content

 

XML
リクエスト

PUT /api/v2/ipsec/ipsec-local-policy/local-policy/1
Content-Type: application/xml

 

<local-policy>
<number>1</number>
<local-address>
<address-family>ip</address-family>
</local-address>
<self-identity>
<type>fqdn</type>
<id>nxr</id>
</self-identity>
</local-policy>

 

レスポンス

204 No content

 

IPsecローカルポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-local-policy/local-policy/{NUM}
JSON
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy/1
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"number": 1,
"local-address": {
"address-family": "ip"
},
"self-identity": {
"type": "fqdn",
"id": "nxr"
}
}

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy/1
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<local-policy>
<number>1</number>
<local-address>
<address-family>ip</address-family>
</local-address>
<self-identity>
<type>fqdn</type>
<id>nxr</id>
</self-identity>
</local-policy>

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-local-policy/local-policy/1
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec local policy 1
address ip
self-identity fqdn nxr

 

IPsecローカルポリシー設定の削除

メソッド URI
DELETE /api/v2/ipsec/ipsec-local-policy/local-policy/{NUM}
リクエスト

DELETE /api/v2/ipsec/ipsec-local-policy/local-policy/1

 

レスポンス

204 No content

 

IPsec ISAKMPポリシー設定の作成

メソッド URI
POST /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
JSON
リクエスト

POST /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
Content-Type: application/json

 

{
"isakmp-policy": {
"number": 1,
"description": "NXR_B",
"authentication": {
"type": "pre-share",
"password": {
"passphrase": "ipseckey1"
}
},
"transform": {
"hash": "sha256",
"encryption": "aes128",
"group": 5
},
"mode": "main",
"remote": {
"remote-address": {
"address-family": "ip",
"address": "203.0.113.1"
}
},
"local-policy": {
"number": 1
}
}
}

 

レスポンス

201 Created

 

XML
リクエスト

POST /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
Content-Type: application/xml

 

<ipsec-isakmp-policy>
<isakmp-policy>
<number>1</number>
<description>NXR_B</description>
<authentication>
<type>pre-share</type>
<password>
<passphrase>ipseckey1</passphrase>
</password>
</authentication>
<transform>
<hash>sha256</hash>
<encryption>aes128</encryption>
<group>5</group>
</transform>
<mode>main</mode>
<remote>
<remote-address>
<address-family>ip</address-family>
<address>203.0.113.1</address>
</remote-address>
</remote>
<local-policy>
<number>1</number>
</local-policy>
</isakmp-policy>
</ipsec-isakmp-policy>

 

レスポンス

201 Created

 

全IPsec ISAKMPポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
JSON
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"isakmp-policy": [
{
"number": 1,
"description": "NXR_B",
"authentication": {
"type": "pre-share",
"password": {
"passphrase": "ipseckey1"
}
},
"transform": {
"hash": "sha256",
"encryption": "aes128",
"group": 5
},
"mode": "main",
"remote": {
"remote-address": {
"address-family": "ip",
"address": "203.0.113.1"
}
},
"local-policy": {
"number": 1
}
},
{
"number": 2,
・・・・・

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<ipsec-isakmp-policy>
<isakmp-policy>
<number>1</number>
<description>NXR_B</description>
<authentication>
<type>pre-share</type>
<password>
<passphrase>ipseckey1</passphrase>
</password>
</authentication>
<transform>
<hash>sha256</hash>
<encryption>aes128</encryption>
<group>5</group>
</transform>
<mode>main</mode>
<remote>
<remote-address>
<address-family>ip</address-family>
<address>203.0.113.1</address>
</remote-address>
</remote>
<local-policy>
<number>1</number>
</local-policy>
</isakmp-policy>
<isakmp-policy>
<number>2</number>
・・・・・

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec isakmp policy 1
description NXR_B
authentication pre-share ipseckey1
hash sha256
encryption aes128
group 5
isakmp-mode main
remote address ip 203.0.113.1
local policy 1
ipsec isakmp policy 2
・・・・・

 

IPsec ISAKMPポリシー設定の更新

メソッド URI
PUT /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/{NUM}
JSON
リクエスト

PUT /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1
Content-Type: application/json

 

{
"number": 1,
"description": "NXR_B",
"authentication": {
"type": "pre-share",
"password": {
"passphrase": "ipseckey1"
}
},
"dpd": {
"action": "clear"
},
"transform": {
"hash": "sha256",
"encryption": "aes128",
"group": 5
},
"mode": "aggressive",
"remote": {
"remote-address": {
"address-family": "ip",
"address": "any"
},
"remote-identity": {
"type": "fqdn",
"id": "nxr"
}
},
"local-policy": {
"number": 1
}
}

 

レスポンス

204 No content

 

XML
リクエスト

PUT /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1
Content-Type: application/xml

 

<isakmp-policy>
<number>1</number>
<description>NXR_B</description>
<authentication>
<type>pre-share</type>
<password>
<passphrase>ipseckey1</passphrase>
</password>
</authentication>
<dpd>
<action>clear</action>
</dpd>
<transform>
<hash>sha256</hash>
<encryption>aes128</encryption>
<group>5</group>
</transform>
<mode>aggressive</mode>
<remote>
<remote-address>
<address-family>ip</address-family>
<address>any</address>
</remote-address>
<remote-identity>
<type>fqdn</type>
<id>nxr</id>
</remote-identity>
</remote>
<local-policy>
<number>1</number>
</local-policy>
</isakmp-policy>

 

レスポンス

204 No content

 

IPsec ISAKMPポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/{NUM}
JSON
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"number": 1,
"description": "NXR_B",
"authentication": {
"type": "pre-share",
"password": {
"passphrase": "ipseckey1"
}
},
"dpd": {
"action": "clear"
},
"transform": {
"hash": "sha256",
"encryption": "aes128",
"group": 5
},
"mode": "aggressive",
"remote": {
"remote-address": {
"address-family": "ip",
"address": "any"
},
"remote-identity": {
"type": "fqdn",
"id": "nxr"
}
},
"local-policy": {
"number": 1
}
}

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<isakmp-policy>
<number>1</number>
<description>NXR_B</description>
<authentication>
<type>pre-share</type>
<password>
<passphrase>ipseckey1</passphrase>
</password>
</authentication>
<dpd>
<action>clear</action>
</dpd>
<transform>
<hash>sha256</hash>
<encryption>aes128</encryption>
<group>5</group>
</transform>
<mode>aggressive</mode>
<remote>
<remote-address>
<address-family>ip</address-family>
<address>any</address>
</remote-address>
<remote-identity>
<type>fqdn</type>
<id>nxr</id>
</remote-identity>
</remote>
<local-policy>
<number>1</number>
</local-policy>
</isakmp-policy>

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec isakmp policy 1
description NXR_B
authentication pre-share ipseckey1
keepalive 30 3 periodic clear
hash sha256
encryption aes128
group 5
isakmp-mode aggressive
remote address ip any
remote identity fqdn nxr
local policy 1

 

IPsec ISAKMPポリシー設定の削除

メソッド URI
DELETE /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/{NUM}
リクエスト

DELETE /api/v2/ipsec/ipsec-isakmp-policy/isakmp-policy/1

 

レスポンス

204 No content

 

IPsecトンネルポリシー設定の作成

メソッド URI
POST /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
JSON
リクエスト

POST /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Content-Type: application/json

 

{
"tunnel-policy": {
"number": 1,
"description": "NXR_B",
"transform": {
"hash": "esp-sha256-hmac",
"encryption": "esp-aes128"
},
"pfs-group": {
"group": "group5"
},
"key-exchange": {
"type": "isakmp",
"number": 1
},
"match-address": "ipsec_acl"
}
}

 

レスポンス

201 Created

 

XML
リクエスト

POST /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Content-Type: application/xml

 

<ipsec-tunnel-policy>
<tunnel-policy>
<number>1</number>
<description>NXR_B</description>
<transform>
<hash>esp-sha256-hmac</hash>
<encryption>esp-aes128</encryption>
</transform>
<pfs-group>
<group>group5</group>
</pfs-group>
<key-exchange>
<type>isakmp</type>
<number>1</number>
</key-exchange>
<match-address>ipsec_acl</match-address>
</tunnel-policy>
</ipsec-tunnel-policy>

 

レスポンス

201 Created

 

全IPsecトンネルポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
JSON
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"tunnel-policy": [
{
"number": 1,
"description": "NXR_B",
"transform": {
"hash": "esp-sha256-hmac",
"encryption": "esp-aes128"
},
"pfs-group": {
"group": "group5"
},
"key-exchange": {
"type": "isakmp",
"number": 1
},
"match-address": "ipsec_acl"
},
{
"number": 2,
・・・・・

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<ipsec-tunnel-policy>
<tunnel-policy>
<number>1</number>
<description>NXR_B</description>
<transform>
<hash>esp-sha256-hmac</hash>
<encryption>esp-aes128</encryption>
</transform>
<pfs-group>
<group>group5</group>
</pfs-group>
<key-exchange>
<type>isakmp</type>
<number>1</number>
</key-exchange>
<match-address>ipsec_acl</match-address>
</tunnel-policy>
<tunnel-policy>
<number>2</number>
・・・・・

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec tunnel policy 1
description NXR_B
set transform esp-aes128 esp-sha256-hmac
set pfs group5
set key-exchange isakmp 1
match address ipsec_acl
ipsec tunnel policy 2
・・・・・

 

IPsecトンネルポリシー設定の更新

メソッド URI
PUT /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/{NUM}
JSON
リクエスト

PUT /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1
Content-Type: application/json

 

{
"number": 1,
"description": "NXR_B",
"transform": {
"hash": "esp-sha256-hmac",
"encryption": "esp-aes128"
},
"pfs-group": {
"group": "group5"
},
"key-exchange": {
"type": "isakmp",
"number": 1
},
"negotiation-mode": "responder",
"match-address": "ipsec_acl"
}

 

レスポンス

204 No content

 

XML
リクエスト

PUT /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1
Content-Type: application/xml

 

<tunnel-policy>
<number>1</number>
<description>NXR_B</description>
<transform>
<hash>esp-sha256-hmac</hash>
<encryption>esp-aes128</encryption>
</transform>
<pfs-group>
<group>group5</group>
</pfs-group>
<key-exchange>
<type>isakmp</type>
<number>1</number>
</key-exchange>
<negotiation-mode>responder</negotiation-mode>
<match-address>ipsec_acl</match-address>
</tunnel-policy>

 

レスポンス

204 No content

 

IPsecトンネルポリシー設定の取得

メソッド URI
GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/{NUM}
JSON
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"number": 1,
"description": "NXR_B",
"transform": {
"hash": "esp-sha256-hmac",
"encryption": "esp-aes128"
},
"pfs-group": {
"group": "group5"
},
"key-exchange": {
"type": "isakmp",
"number": 1
},
"negotiation-mode": "responder",
"match-address": "ipsec_acl"
}

 

XML
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<tunnel-policy>
<number>1</number>
<description>NXR_B</description>
<transform>
<hash>esp-sha256-hmac</hash>
<encryption>esp-aes128</encryption>
</transform>
<pfs-group>
<group>group5</group>
</pfs-group>
<key-exchange>
<type>isakmp</type>
<number>1</number>
</key-exchange>
<negotiation-mode>responder</negotiation-mode>
<match-address>ipsec_acl</match-address>
</tunnel-policy>

 

TEXT/PLAIN
リクエスト

GET /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec tunnel policy 1
description NXR_B
negotiation-mode responder
set transform esp-aes128 esp-sha256-hmac
set pfs group5
set key-exchange isakmp 1
match address ipsec_acl

 

IPsecトンネルポリシー設定の削除

メソッド URI
DELETE /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/{NUM}
リクエスト

DELETE /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy/1

 

レスポンス

204 No content

 

IPsecアクセスリスト設定の作成

メソッド URI
POST /api/v2/acl_ipsec/access-list
JSON
リクエスト

POST /api/v2/acl_ipsec/access-list
Content-Type: application/json

 

{
"access-list": {
"name": "ipsec_acl",
"protocol": "ip",
"rule": {
"permission": "permit",
"protocol": "ip",
"destination": "any",
"source": "any"
}
}
}

 

レスポンス

201 Created

 

XML
リクエスト

POST /api/v2/ipsec/ipsec-tunnel-policy/tunnel-policy
Content-Type: application/xml

 

<acl_ipsec>
<access-list>
<name>ipsec_acl</name>
<protocol>ip</protocol>
<rule>
<permission>permit</permission>
<protocol>ip</protocol>
<destination>any</destination>
<source>any</source>
</rule>
</access-list>
</acl_ipsec>

 

レスポンス

201 Created

 

IPsecアクセスリスト設定の追加・更新

メソッド URI
PUT /api/v2/acl_ipsec/access-list/{NAME}
  • 既存のアクセスリスト名に対するルールの追加・更新が可能です。

 

JSON
リクエスト

PUT /api/v2/acl_ipsec/access-list/ipsec_acl
Content-Type: application/json

 

{
"name": "ipsec_acl",
"protocol": "ip",
"rule": {
"permission": "permit",
"protocol": "ip",
"destination": "host",
"source": "host"
}
}

 

レスポンス

204 No content

 

XML
リクエスト

PUT /api/v2/acl_ipsec/access-list/ipsec_acl
Content-Type: application/xml

 

<access-list>
<name>ipsec_acl</name>
<protocol>ip</protocol>
<rule>
<permission>permit</permission>
<protocol>ip</protocol>
<destination>host</destination>
<source>host</source>
</rule>
</access-list>

 

レスポンス

204 No content

 

IPsecアクセスリスト設定の取得

メソッド URI
GET /api/v2/acl_ipsec/access-list/{NAME}
JSON
リクエスト

GET /api/v2/acl_ipsec/access-list/ipsec_acl
Accept: application/json

 

レスポンス

200 OK
Content-Type: application/json

 

{
"name": "ipsec_acl",
"protocol": "ip",
"rule": {
"permission": "permit",
"protocol": "ip",
"destination": "any",
"source": "any"
}
}

 

XML
リクエスト

GET /api/v2/acl_ipsec/access-list/ipsec_acl
Accept: application/xml

 

レスポンス

200 OK
Content-Type: application/xml

 

<access-list>
<name>ipsec_acl</name>
<protocol>ip</protocol>
<rule>
<permission>permit</permission>
<protocol>ip</protocol>
<destination>any</destination>
<source>any</source>
</rule>
</access-list>

 

TEXT/PLAIN
リクエスト

GET /api/v2/acl_ipsec/access-list/ipsec_acl
Accept: text/plain

 

レスポンス

200 OK
Content-Type: text/plain

 

ipsec access-list ipsec_acl ip any any

 

IPsecアクセスリスト設定の削除

メソッド URI
DELETE /api/v2/acl_ipsec/access-list/{NAME}
  • Bodyを指定しなかった場合、指定したNAMEのIPsecアクセスリスト設定を全て削除します。

 

JSON
リクエスト

DELETE /api/v2/acl_ipsec/access-list/ipsec_acl
Content-Type: application/json

 

{
"name": "ipsec_acl",
"protocol": "ip",
"rule": {
"permission": "permit",
"protocol": "ip",
"destination": "any",
"source": "any"
}
}

 

レスポンス

204 No content

 

XML
リクエスト

DELETE /api/v2/acl_ipsec/access-list/ipsec_acl
Content-Type: application/xml

 

<access-list>
<name>ipsec_acl</name>
<protocol>ip</protocol>
<rule>
<permission>permit</permission>
<protocol>ip</protocol>
<destination>any</destination>
<source>any</source>
</rule>
</access-list>

 

レスポンス

204 No content