A firewall group rule represents a collection of attributes like ports, IP addresses which define match criteria and action (allow, or deny) that needs to be taken on the matched data traffic.
Network v2
Create a new firewall rule
openstack firewall group rule create
[-f {json,shell,table,value,yaml}]
[-c COLUMN]
[--noindent]
[--prefix PREFIX]
[--max-width <integer>]
[--fit-width]
[--print-empty]
[--name <name>]
[--description <description>]
[--protocol {tcp,udp,icmp,any}]
[--action {allow,deny,reject}]
[--ip-version <ip-version>]
[--source-ip-address <source-ip-address> | --no-source-ip-address]
[--destination-ip-address <destination-ip-address> | --no-destination-ip-address]
[--source-port <source-port> | --no-source-port]
[--destination-port <destination-port> | --no-destination-port]
[--public | --private]
[--enable-rule | --disable-rule]
[--project <project>]
[--project-domain <project-domain>]
-f
<FORMATTER>
,
--format
<FORMATTER>
¶the output format, defaults to table
-c
COLUMN
,
--column
COLUMN
¶specify the column(s) to include, can be repeated
--noindent
¶whether to disable indenting the JSON
--prefix
<PREFIX>
¶add a prefix to all variable names
--max-width
<integer>
¶Maximum display width, <1 to disable. You can also use the CLIFF_MAX_TERM_WIDTH environment variable, but the parameter takes precedence.
--fit-width
¶Fit the table to the display width. Implied if –max-width greater than 0. Set the environment variable CLIFF_FIT_WIDTH=1 to always enable
--print-empty
¶Print empty table if there is no data to show.
--name
<name>
¶Name of the firewall rule
--description
<description>
¶Description of the firewall rule
--protocol
<PROTOCOL>
¶Protocol for the firewall rule
--action
<ACTION>
¶Action for the firewall rule
--ip-version
<ip-version>
¶Set IP version 4 or 6 (default is 4)
--source-ip-address
<source-ip-address>
¶Source IP address or subnet
--no-source-ip-address
¶Detach source IP address
--destination-ip-address
<destination-ip-address>
¶Destination IP address or subnet
--no-destination-ip-address
¶Detach destination IP address
--source-port
<source-port>
¶Source port number or range(integer in [1, 65535] or range like 123:456)
--no-source-port
¶Detach source port number or range
--destination-port
<destination-port>
¶Destination port number or range(integer in [1, 65535] or range like 123:456)
--no-destination-port
¶Detach destination port number or range
--public
¶Make the firewall rule public, which allows it to be used in all projects (as opposed to the default, which is to restrict its use to the current project)
--private
¶Restrict use of the firewall rule to the current project
--enable-rule
¶Enable this rule (default is enabled)
--disable-rule
¶Disable this rule
--project
<project>
¶Owner’s project (name or ID)
--project-domain
<project-domain>
¶Domain the project belongs to (name or ID). This can be used in case collisions between project names exist.
Delete firewall rule(s)
openstack firewall group rule delete
<firewall-rule>
[<firewall-rule> ...]
firewall-rule
¶Firewall rule(s) to delete (name or ID)
List firewall rules that belong to a given tenant
openstack firewall group rule list
[-f {csv,json,table,value,yaml}]
[-c COLUMN]
[--noindent]
[--max-width <integer>]
[--fit-width]
[--print-empty]
[--quote {all,minimal,none,nonnumeric}]
[--long]
-f
<FORMATTER>
,
--format
<FORMATTER>
¶the output format, defaults to table
-c
COLUMN
,
--column
COLUMN
¶specify the column(s) to include, can be repeated
--noindent
¶whether to disable indenting the JSON
--max-width
<integer>
¶Maximum display width, <1 to disable. You can also use the CLIFF_MAX_TERM_WIDTH environment variable, but the parameter takes precedence.
--fit-width
¶Fit the table to the display width. Implied if –max-width greater than 0. Set the environment variable CLIFF_FIT_WIDTH=1 to always enable
--print-empty
¶Print empty table if there is no data to show.
--quote
<QUOTE_MODE>
¶when to include quotes, defaults to nonnumeric
--long
¶List additional fields in output
Set firewall rule properties
openstack firewall group rule set
[--name <name>]
[--description <description>]
[--protocol {tcp,udp,icmp,any}]
[--action {allow,deny,reject}]
[--ip-version <ip-version>]
[--source-ip-address <source-ip-address> | --no-source-ip-address]
[--destination-ip-address <destination-ip-address> | --no-destination-ip-address]
[--source-port <source-port> | --no-source-port]
[--destination-port <destination-port> | --no-destination-port]
[--public | --private]
[--enable-rule | --disable-rule]
<firewall-rule>
--name
<name>
¶Name of the firewall rule
--description
<description>
¶Description of the firewall rule
--protocol
<PROTOCOL>
¶Protocol for the firewall rule
--action
<ACTION>
¶Action for the firewall rule
--ip-version
<ip-version>
¶Set IP version 4 or 6 (default is 4)
--source-ip-address
<source-ip-address>
¶Source IP address or subnet
--no-source-ip-address
¶Detach source IP address
--destination-ip-address
<destination-ip-address>
¶Destination IP address or subnet
--no-destination-ip-address
¶Detach destination IP address
--source-port
<source-port>
¶Source port number or range(integer in [1, 65535] or range like 123:456)
--no-source-port
¶Detach source port number or range
--destination-port
<destination-port>
¶Destination port number or range(integer in [1, 65535] or range like 123:456)
--no-destination-port
¶Detach destination port number or range
--public
¶Make the firewall rule public, which allows it to be used in all projects (as opposed to the default, which is to restrict its use to the current project)
--private
¶Restrict use of the firewall rule to the current project
--enable-rule
¶Enable this rule (default is enabled)
--disable-rule
¶Disable this rule
firewall-rule
¶Firewall rule to set (name or ID)
Display firewall rule details
openstack firewall group rule show
[-f {json,shell,table,value,yaml}]
[-c COLUMN]
[--noindent]
[--prefix PREFIX]
[--max-width <integer>]
[--fit-width]
[--print-empty]
<firewall-rule>
-f
<FORMATTER>
,
--format
<FORMATTER>
¶the output format, defaults to table
-c
COLUMN
,
--column
COLUMN
¶specify the column(s) to include, can be repeated
--noindent
¶whether to disable indenting the JSON
--prefix
<PREFIX>
¶add a prefix to all variable names
--max-width
<integer>
¶Maximum display width, <1 to disable. You can also use the CLIFF_MAX_TERM_WIDTH environment variable, but the parameter takes precedence.
--fit-width
¶Fit the table to the display width. Implied if –max-width greater than 0. Set the environment variable CLIFF_FIT_WIDTH=1 to always enable
--print-empty
¶Print empty table if there is no data to show.
firewall-rule
¶Firewall rule to display (name or ID)
Unset firewall rule properties
openstack firewall group rule unset
[--source-ip-address]
[--destination-ip-address]
[--source-port]
[--destination-port]
[--public]
[--enable-rule]
<firewall-rule>
--source-ip-address
¶Source IP address or subnet
--destination-ip-address
¶Destination IP address or subnet
--source-port
¶Source port number or range(integer in [1, 65535] or range like 123:456)
--destination-port
¶Destination port number or range(integer in [1, 65535] or range like 123:456)
--public
¶Restrict use of the firewall rule to the current project
--enable-rule
¶Disable this rule
firewall-rule
¶Firewall rule to unset (name or ID)
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.