An egress audit policy is a set of rules defining how network traffic is monitored and mirrored from a domain for Audit purposes


  • name (Mandatory): The name of the entity
  • last_updated_by: ID of the user who last updated the object.
  • last_updated_date: Time stamp when this object was last updated.
  • active: If enabled, it means that this ACL or QOS entry is active
  • default_allow_ip: If enabled a default ACL of Allow All is added as the last entry in the list of ACL entries
  • default_allow_non_ip: If enabled, non ip traffic will be dropped
  • default_install_acl_implicit_rules: If enabled, implicit rule will allow intra domain traffic by default
  • description: A description of the entity
  • embedded_metadata: Metadata objects associated with this entity. This will contain a list of Metadata objects if the API request is made using the special flag to enable the embedded Metadata feature. Only a maximum of Metadata objects is returned based on the value set in the system configuration.
  • entity_scope: Specify if scope of entity is Data center or Enterprise level
  • policy_state: None
  • creation_date: Time stamp when this object was created.
  • priority: The priority of the ACL entry that determines the order of entries
  • priority_type: Possible values: TOP_AUDIT. This will be the top most of the egres ACL stack
  • associated_live_entity_id: In the draft mode, the ACL entry refers to this LiveEntity. In non-drafted mode, this is null.
  • associated_virtual_firewall_policy_id: The ID of the Virtual Firewall Policy, if this was created as part of the Virtual Firewall Policy creation
  • auto_generate_priority: This option only affects how the children ACL entry priorities of this template/policy are generated when the priority is not specified. If ‘false’, the priority is generated by incrementing the current highest ACL Entry priority by 100. If ‘true’, a random priority will be generated, which is advised when creating many entries concurrently without specifying the priority. This will cause the new child ACL entry to get a random, non-predictable, priority. Therefore it is advised to only enable this when allow rules are being created. If any type of ACL entry order is required, keep this value to ‘false’ and use your own defined priorities, this will make sure there is a clear set of priorities and how traffic is validated against the ACL entries.
  • owner: Identifies the user that has created this object.
  • external_id: External object ID. Used for integration with third party systems


class fetcher
nupermission.NUPermission permissions
numetadata.NUMetadata metadatas
nuegressauditaclentrytemplate.NUEgressAuditACLEntryTemplate egress_audit_acl_entry_templates
nuglobalmetadata.NUGlobalMetadata global_metadatas