osc network default-security-group-rule create
Creates an Openstack Networking security group rule template.
Normal response codes: 201
Error response codes: 400, 401, 404, 409
Usage: osc network default-security-group-rule create [OPTIONS]
Options:
-
--description <DESCRIPTION>
— A human-readable description for the resource. Default is an empty string -
--direction <DIRECTION>
— Ingress or egress, which is the direction in which the security group rule is appliedPossible values:
egress
,ingress
-
--ethertype <ETHERTYPE>
— Must be IPv4 or IPv6, and addresses represented in CIDR must match the ingress or egress rulesPossible values:
ipv4
,ipv6
-
--port-range-max <PORT_RANGE_MAX>
— The maximum port number in the range that is matched by the security group rule. If the protocol is TCP, UDP, DCCP, SCTP or UDP-Lite this value must be greater than or equal to theport_range_min
attribute value. If the protocol is ICMP, this value must be an ICMP code -
--port-range-min <PORT_RANGE_MIN>
— The minimum port number in the range that is matched by the security group rule. If the protocol is TCP, UDP, DCCP, SCTP or UDP-Lite this value must be less than or equal to theport_range_max
attribute value. If the protocol is ICMP, this value must be an ICMP type -
--protocol <PROTOCOL>
— The IP protocol can be represented by a string, an integer, ornull
. Valid string or integer values areany
or0
,ah
or51
,dccp
or33
,egp
or8
,esp
or50
,gre
or47
,icmp
or1
,icmpv6
or58
,igmp
or2
,ipip
or4
,ipv6-encap
or41
,ipv6-frag
or44
,ipv6-icmp
or58
,ipv6-nonxt
or59
,ipv6-opts
or60
,ipv6-route
or43
,ospf
or89
,pgm
or113
,rsvp
or46
,sctp
or132
,tcp
or6
,udp
or17
,udplite
or136
,vrrp
or112
. Additionally, any integer value between [0-255] is also valid. The stringany
(or integer0
) meansall
IP protocols. See the constants inneutron_lib.constants
for the most up-to-date list of supported strings -
--remote-address-group-id <REMOTE_ADDRESS_GROUP_ID>
-
--remote-group-id <REMOTE_GROUP_ID>
— The remote group UUID to associate with this security group rule. You can specify either theremote_group_id
orremote_ip_prefix
attribute in the request body -
--remote-ip-prefix <REMOTE_IP_PREFIX>
— The remote IP prefix that is matched by this security group rule -
--tenant-id <TENANT_ID>
-
--used-in-default-sg <USED_IN_DEFAULT_SG>
— Whether this security group rule template should be used in default security group created automatically for each new project. Default value isFalse
Possible values:
true
,false
-
--used-in-non-default-sg <USED_IN_NON_DEFAULT_SG>
— Whether this security group rule template should be used in custom security groups created by project user. Default value isTrue
Possible values:
true
,false