Files
doc
source
_extra
cli
command-objects
access-token.rst
address-scope.rst
aggregate.rst
application-credentials.rst
availability-zone.rst
backup.rst
catalog.rst
command.rst
complete.rst
compute-agent.rst
compute-service.rst
configuration.rst
consistency-group-snapshot.rst
consistency-group.rst
console-log.rst
console-url.rst
consumer.rst
container.rst
credential.rst
domain.rst
ec2-credentials.rst
endpoint.rst
endpoint_group.rst
extension.rst
federation-protocol.rst
flavor.rst
floating-ip-pool.rst
floating-ip.rst
group.rst
host.rst
hypervisor-stats.rst
hypervisor.rst
identity-provider.rst
image.rst
implied_role.rst
ip-availability.rst
ip-fixed.rst
keypair.rst
limit.rst
limits.rst
mapping.rst
module.rst
network-agent.rst
network-auto-allocated-topology.rst
network-flavor-profile.rst
network-flavor.rst
network-meter-rule.rst
network-meter.rst
network-qos-policy.rst
network-qos-rule-type.rst
network-qos-rule.rst
network-rbac.rst
network-segment.rst
network-service-provider.rst
network.rst
object-store-account.rst
object.rst
policy.rst
port.rst
project-purge.rst
project.rst
quota.rst
region.rst
registered-limit.rst
request-token.rst
role-assignment.rst
role.rst
router.rst
security-group-rule.rst
security-group.rst
server-backup.rst
server-event.rst
server-group.rst
server-image.rst
server.rst
service-provider.rst
service.rst
snapshot.rst
subnet-pool.rst
subnet.rst
token.rst
trust.rst
usage.rst
user-role.rst
user.rst
versions.rst
volume-backend.rst
volume-backup.rst
volume-host.rst
volume-qos.rst
volume-service.rst
volume-snapshot.rst
volume-transfer-request.rst
volume-type.rst
volume.rst
data
man
authentication.rst
backwards-incompatible.rst
command-list.rst
commands.rst
decoder.rst
index.rst
interactive.rst
plugin-commands.rst
configuration
contributor
conf.py
index.rst
Makefile
requirements.txt
examples
openstackclient
releasenotes
tools
.coveragerc
.gitignore
.gitreview
.mailmap
.stestr.conf
.zuul.yaml
CONTRIBUTING.rst
HACKING.rst
LICENSE
README.rst
babel.cfg
lower-constraints.txt
requirements.txt
setup.cfg
setup.py
test-requirements.txt
tox.ini
python-openstackclient/doc/source/cli/command-objects/security-group-rule.rst
Doug Hellmann 9599ffe65d reorganize existing documentation according to the new standard layout
Move existing content around based on the doc-migration specification.

Replace :doc: markup with :ref: to have sphinx keep track of where the
files move and generate valid hyperlinks.

Add a few toctrees and index pages for the new directories.

Depends-On: Ia750cb049c0f53a234ea70ce1f2bbbb7a2aa9454
Change-Id: I253ee8f89d3ec40e39310c18bb87ed1d3d5de330
Signed-off-by: Doug Hellmann <doug@doughellmann.com>
2017-06-23 11:54:32 +02:00

4.2 KiB

security group rule

A security group rule specifies the network access rules for servers and other resources on the network.

Compute v2, Network v2

security group rule create

Create a new security group rule

security group rule create

openstack security group rule create
    [--remote-ip <ip-address> | --remote-group <group>]
    [--dst-port <port-range> | [--icmp-type <icmp-type> [--icmp-code <icmp-code>]]]
    [--protocol <protocol>]
    [--ingress | --egress]
    [--ethertype <ethertype>]
    [--project <project> [--project-domain <project-domain>]]
    [--description <description>]
    <group>

--remote-ip <ip-address>

Remote IP address block (may use CIDR notation; default for IPv4 rule: 0.0.0.0/0)

--remote-group <group>

Remote security group (name or ID)

--dst-port <port-range>

Destination port, may be a single port or a starting and ending port range: 137:139. Required for IP protocols TCP and UDP. Ignored for ICMP IP protocols.

--icmp-type <icmp-type>

ICMP type for ICMP IP protocols

Network version 2 only

--icmp-code <icmp-code>

ICMP code for ICMP IP protocols

Network version 2 only

--protocol <protocol>

IP protocol (icmp, tcp, udp; default: tcp)

Compute version 2

IP protocol (ah, dccp, egp, esp, gre, icmp, igmp, ipv6-encap, ipv6-frag, ipv6-icmp, ipv6-nonxt, ipv6-opts, ipv6-route, ospf, pgm, rsvp, sctp, tcp, udp, udplite, vrrp and integer representations [0-255]; default: tcp)

Network version 2

--ingress

Rule applies to incoming network traffic (default)

Network version 2 only

--egress

Rule applies to outgoing network traffic

Network version 2 only

--ethertype <ethertype>

Ethertype of network traffic (IPv4, IPv6; default: based on IP protocol)

Network version 2 only

--project <project>

Owner's project (name or ID)

Network version 2 only

--project-domain <project-domain>

Domain the project belongs to (name or ID). This can be used in case collisions between project names exist.

Network version 2 only

--description <description>

Set security group rule description

Network version 2 only

<group>

Create rule in this security group (name or ID)

security group rule delete

Delete security group rule(s)

security group rule delete

openstack security group rule delete
    <rule> [<rule> ...]

<rule>

Security group rule(s) to delete (ID only)

security group rule list

List security group rules

security group rule list

openstack security group rule list
    [--all-projects]
    [--protocol <protocol>]
    [--ingress | --egress]
    [--long]
    [<group>]

--all-projects

Display information from all projects (admin only)

Network version 2 ignores this option and will always display information for all projects (admin only).

--long

List additional fields in output

Compute version 2 does not have additional fields to display.

--protocol

List rules by the IP protocol (ah, dhcp, egp, esp, gre, icmp, igmp, ipv6-encap, ipv6-frag, ipv6-icmp, ipv6-nonxt,ipv6-opts, ipv6-route, ospf, pgm, rsvp, sctp, tcp, udp, udplite, vrrp and integer representations [0-255])

Network version 2

--ingress

List rules applied to incoming network traffic

Network version 2 only

--egress

List rules applied to outgoing network traffic

Network version 2 only

<group>

List all rules in this security group (name or ID)

security group rule show

Display security group rule details

security group rule show

openstack security group rule show
    <rule>

<rule>

Security group rule to display (ID only)