osc network default-security-group-rule create
Creates an Openstack Networking security group rule template.
Normal response codes: 201
Error response codes: 400, 401, 404, 409
Usage: osc network default-security-group-rule create [OPTIONS]
Options:
- 
--description <DESCRIPTION>— A human-readable description for the resource. Default is an empty string - 
--direction <DIRECTION>— Ingress or egress, which is the direction in which the security group rule is appliedPossible values:
egress,ingress - 
--ethertype <ETHERTYPE>— Must be IPv4 or IPv6, and addresses represented in CIDR must match the ingress or egress rulesPossible values:
ipv4,ipv6 - 
--port-range-max <PORT_RANGE_MAX>— The maximum port number in the range that is matched by the security group rule. If the protocol is TCP, UDP, DCCP, SCTP or UDP-Lite this value must be greater than or equal to theport_range_minattribute value. If the protocol is ICMP, this value must be an ICMP code - 
--port-range-min <PORT_RANGE_MIN>— The minimum port number in the range that is matched by the security group rule. If the protocol is TCP, UDP, DCCP, SCTP or UDP-Lite this value must be less than or equal to theport_range_maxattribute value. If the protocol is ICMP, this value must be an ICMP type - 
--protocol <PROTOCOL>— The IP protocol can be represented by a string, an integer, ornull. Valid string or integer values areanyor0,ahor51,dccpor33,egpor8,espor50,greor47,icmpor1,icmpv6or58,igmpor2,ipipor4,ipv6-encapor41,ipv6-fragor44,ipv6-icmpor58,ipv6-nonxtor59,ipv6-optsor60,ipv6-routeor43,ospfor89,pgmor113,rsvpor46,sctpor132,tcpor6,udpor17,udpliteor136,vrrpor112. Additionally, any integer value between [0-255] is also valid. The stringany(or integer0) meansallIP protocols. See the constants inneutron_lib.constantsfor the most up-to-date list of supported strings - 
--remote-address-group-id <REMOTE_ADDRESS_GROUP_ID> - 
--remote-group-id <REMOTE_GROUP_ID>— The remote group UUID to associate with this security group rule. You can specify either theremote_group_idorremote_ip_prefixattribute in the request body - 
--remote-ip-prefix <REMOTE_IP_PREFIX>— The remote IP prefix that is matched by this security group rule - 
--tenant-id <TENANT_ID> - 
--used-in-default-sg <USED_IN_DEFAULT_SG>— Whether this security group rule template should be used in default security group created automatically for each new project. Default value isFalsePossible values:
true,false - 
--used-in-non-default-sg <USED_IN_NON_DEFAULT_SG>— Whether this security group rule template should be used in custom security groups created by project user. Default value isTruePossible values:
true,false