diff --git a/api-ref/src/wadls/netconn-api/src/common.ent b/api-ref/src/wadls/netconn-api/src/common.ent
index c644a2d28..af300a2ef 100644
--- a/api-ref/src/wadls/netconn-api/src/common.ent
+++ b/api-ref/src/wadls/netconn-api/src/common.ent
@@ -575,78 +575,6 @@
Integer value for the limit of values to return.
'>
-
-
- Security group rule object.
-
-
-
- Either ingress or egress.
-
-
-
- Either IPv4 or IPv6.
-
-
-
- The ID for the security group rule.
-
-
-
- The maximum port ranges. Set to
- null.
-
-
-
- The minimum port ranges. Set to
- null.
-
-
-
- The protocol. Set to null.
-
-
-
- The remote group ID. Set to
- null.
-
-
-
- The remote IP prefix. Set to
- null.
-
-
-
- The security group ID for the security group with
- which the rule is
- associated.
-
-
-
- The tenant ID.
- '>
The
security group name.
- &securityGroupRule;
+
@@ -163,7 +164,8 @@
The
security group name.
- &securityGroupRule;
+
@@ -229,7 +231,8 @@
The
security group name.
- &securityGroupRule;
+
@@ -306,39 +309,6 @@
The list provides the unique ID for each security
group rule.
-
-
-
-
-
-
-
- &securityGroupRule;
-
-
-
-
-
-
-
-
-
-
-
-
- Creates an OpenStack Networking
- security group rule.
-
@@ -351,6 +321,13 @@
rule is applied to traffic leaving the
instance.
+
+ Must be IPv4 or IPv6,
+ and addresses represented in CIDR must match the ingress or
+ egress rules.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Creates an OpenStack Networking
+ security group rule.
+
+
+
+ Ingress or
+ egress: The direction in which the security group
+ rule is applied. For a compute instance, an
+ ingress security group rule is applied to incoming
+ (ingress) traffic for that instance. An egress
+ rule is applied to traffic leaving the
+ instance.
+
+
+ Must be IPv4 or IPv6,
+ and addresses represented in CIDR must match the ingress or
+ egress rules.
+
+
+ The security
+ group ID to associate with this security group
+ rule.
+
+
+ The minimum
+ port number in the range that is matched by the
+ security group rule. If the protocol is TCP or
+ UDP, this value must be less than or equal to the
+ value of the port_range_max attribute. If the
+ protocol is ICMP, this value must be an ICMP
+ type.
+
+
+ The maximum
+ port number in the range that is matched by the
+ security group rule. The port_range_min attribute
+ constrains the port_range_max attribute. If the
+ protocol is ICMP, this value must be an ICMP
+ type.
+
+
+ The protocol
+ that is matched by the security group rule. Valid
+ values are null, tcp, udp, and icmp.
+
+
+ The remote
+ group ID to be associated with this security group
+ rule. You can specify either remote_group_id or
+ remote_ip_prefix in the request body.
+
+
+ The remote
+ IP prefix to be associated with this security
+ group rule. You can specify either remote_group_id
+ or remote_ip_prefix in the request body. This
+ attribute matches the specified IP prefix as the
+ source IP address of the IP packet.
+
+
The
security group name.
- &securityGroupRule;
@@ -489,7 +570,78 @@
- &securityGroupRule;
+
+ Ingress or
+ egress: The direction in which the security group
+ rule is applied. For a compute instance, an
+ ingress security group rule is applied to incoming
+ (ingress) traffic for that instance. An egress
+ rule is applied to traffic leaving the
+ instance.
+
+
+ Must be IPv4 or IPv6,
+ and addresses represented in CIDR must match the ingress or
+ egress rules.
+
+
+ The security
+ group ID to associate with this security group
+ rule.
+
+
+ The minimum
+ port number in the range that is matched by the
+ security group rule. If the protocol is TCP or
+ UDP, this value must be less than or equal to the
+ value of the port_range_max attribute. If the
+ protocol is ICMP, this value must be an ICMP
+ type.
+
+
+ The maximum
+ port number in the range that is matched by the
+ security group rule. The port_range_min attribute
+ constrains the port_range_max attribute. If the
+ protocol is ICMP, this value must be an ICMP
+ type.
+
+
+ The protocol
+ that is matched by the security group rule. Valid
+ values are null, tcp, udp, and icmp.
+
+
+ The remote
+ group ID to be associated with this security group
+ rule. You can specify either remote_group_id or
+ remote_ip_prefix in the request body.
+
+
+ The remote
+ IP prefix to be associated with this security
+ group rule. You can specify either remote_group_id
+ or remote_ip_prefix in the request body. This
+ attribute matches the specified IP prefix as the
+ source IP address of the IP packet.
+
@@ -498,7 +650,7 @@
/>
-
+