[user-guide] clean up osc sec group rule commands
Change-Id: If1338337d3c08cae72c04b4171fb7e71dfa4992b Closes-Bug: #1658965
This commit is contained in:
parent
284a06712a
commit
71950b7e84
@ -549,8 +549,8 @@ commands:
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create --protocol icmp default
|
||||
$ openstack security group rule create --protocol tcp --dst-port 22:22 default
|
||||
|
||||
Enable ping and SSH with ``euca2ools``:
|
||||
|
||||
|
@ -309,12 +309,12 @@ you are using. If you are using a plug-in that:
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create --protocol icmp \
|
||||
--ingress
|
||||
--ingress SECURITY_GROUP
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create --protocol tcp \
|
||||
--egress --description "Sample Security Group"
|
||||
--egress --description "Sample Security Group" SECURITY_GROUP
|
||||
|
||||
- Does not implement Networking security groups, you can configure
|
||||
security group rules by using the :command:`openstack security group rule
|
||||
@ -323,8 +323,8 @@ you are using. If you are using a plug-in that:
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create --protocol icmp default
|
||||
$ openstack security group rule create --protocol tcp --dst-port 22:22 default
|
||||
|
||||
.. note::
|
||||
|
||||
|
@ -175,8 +175,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create SECURITY_GROUP_NAME \
|
||||
--protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create --protocol icmp \
|
||||
SECURITY_GROUP_NAME
|
||||
|
||||
This allows access to all codes and all types of ICMP traffic.
|
||||
|
||||
@ -185,8 +185,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create SECURITY_GROUP_NAME \
|
||||
--protocol icmp --dst-port -1:-1 --remote-group SOURCE_GROUP_NAME
|
||||
$ openstack security group rule create --protocol icmp \
|
||||
--remote-group SOURCE_GROUP_NAME SECURITY_GROUP
|
||||
|
||||
#. To allow access through a UDP port, such as allowing access to a DNS
|
||||
server that runs on a VM, choose one of the following options:
|
||||
@ -196,16 +196,16 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create SECURITY_GROUP_NAME \
|
||||
--protocol udp --dst-port 53:53 --remote-ip 0.0.0.0/0
|
||||
$ openstack security group rule create --protocol udp \
|
||||
--dst-port 53:53 SECURITY_GROUP
|
||||
|
||||
- Allow only IP addresses from other security groups (source groups) to
|
||||
access the specified port.
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
$ openstack security group rule create SECURITY_GROUP_NAME \
|
||||
--protocol udp --dst-port 53:53 --remote-group SOURCE_GROUP_NAME
|
||||
$ openstack security group rule create --protocol udp \
|
||||
--dst-port 53:53 --remote-group SOURCE_GROUP_NAME SECURITY_GROUP
|
||||
|
||||
Delete a security group rule
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
Loading…
x
Reference in New Issue
Block a user