[user-guide] clean up osc sec group rule commands

Change-Id: If1338337d3c08cae72c04b4171fb7e71dfa4992b
Closes-Bug: #1658965
This commit is contained in:
KATO Tomoyuki 2017-01-27 13:59:13 +09:00
parent 284a06712a
commit 71950b7e84
3 changed files with 14 additions and 14 deletions

View File

@ -549,8 +549,8 @@ commands:
.. code-block:: console
$ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
$ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0
$ openstack security group rule create --protocol icmp default
$ openstack security group rule create --protocol tcp --dst-port 22:22 default
Enable ping and SSH with ``euca2ools``:

View File

@ -309,12 +309,12 @@ you are using. If you are using a plug-in that:
.. code-block:: console
$ openstack security group rule create --protocol icmp \
--ingress
--ingress SECURITY_GROUP
.. code-block:: console
$ openstack security group rule create --protocol tcp \
--egress --description "Sample Security Group"
--egress --description "Sample Security Group" SECURITY_GROUP
- Does not implement Networking security groups, you can configure
security group rules by using the :command:`openstack security group rule
@ -323,8 +323,8 @@ you are using. If you are using a plug-in that:
.. code-block:: console
$ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
$ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0
$ openstack security group rule create --protocol icmp default
$ openstack security group rule create --protocol tcp --dst-port 22:22 default
.. note::

View File

@ -175,8 +175,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
.. code-block:: console
$ openstack security group rule create SECURITY_GROUP_NAME \
--protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0
$ openstack security group rule create --protocol icmp \
SECURITY_GROUP_NAME
This allows access to all codes and all types of ICMP traffic.
@ -185,8 +185,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
.. code-block:: console
$ openstack security group rule create SECURITY_GROUP_NAME \
--protocol icmp --dst-port -1:-1 --remote-group SOURCE_GROUP_NAME
$ openstack security group rule create --protocol icmp \
--remote-group SOURCE_GROUP_NAME SECURITY_GROUP
#. To allow access through a UDP port, such as allowing access to a DNS
server that runs on a VM, choose one of the following options:
@ -196,16 +196,16 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`.
.. code-block:: console
$ openstack security group rule create SECURITY_GROUP_NAME \
--protocol udp --dst-port 53:53 --remote-ip 0.0.0.0/0
$ openstack security group rule create --protocol udp \
--dst-port 53:53 SECURITY_GROUP
- Allow only IP addresses from other security groups (source groups) to
access the specified port.
.. code-block:: console
$ openstack security group rule create SECURITY_GROUP_NAME \
--protocol udp --dst-port 53:53 --remote-group SOURCE_GROUP_NAME
$ openstack security group rule create --protocol udp \
--dst-port 53:53 --remote-group SOURCE_GROUP_NAME SECURITY_GROUP
Delete a security group rule
~~~~~~~~~~~~~~~~~~~~~~~~~~~~