From 71950b7e84844f47b92e1de9c5b356e402e0ce17 Mon Sep 17 00:00:00 2001 From: KATO Tomoyuki Date: Fri, 27 Jan 2017 13:59:13 +0900 Subject: [PATCH] [user-guide] clean up osc sec group rule commands Change-Id: If1338337d3c08cae72c04b4171fb7e71dfa4992b Closes-Bug: #1658965 --- .../source/compute-networking-nova.rst | 4 ++-- doc/admin-guide/source/networking-use.rst | 8 ++++---- ...a-configure-access-security-for-instances.rst | 16 ++++++++-------- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/doc/admin-guide/source/compute-networking-nova.rst b/doc/admin-guide/source/compute-networking-nova.rst index 05bcb1cbba..2cb3d68f7b 100644 --- a/doc/admin-guide/source/compute-networking-nova.rst +++ b/doc/admin-guide/source/compute-networking-nova.rst @@ -549,8 +549,8 @@ commands: .. code-block:: console - $ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0 - $ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0 + $ openstack security group rule create --protocol icmp default + $ openstack security group rule create --protocol tcp --dst-port 22:22 default Enable ping and SSH with ``euca2ools``: diff --git a/doc/admin-guide/source/networking-use.rst b/doc/admin-guide/source/networking-use.rst index c26c36d6e7..4949d6b642 100644 --- a/doc/admin-guide/source/networking-use.rst +++ b/doc/admin-guide/source/networking-use.rst @@ -309,12 +309,12 @@ you are using. If you are using a plug-in that: .. code-block:: console $ openstack security group rule create --protocol icmp \ - --ingress + --ingress SECURITY_GROUP .. code-block:: console $ openstack security group rule create --protocol tcp \ - --egress --description "Sample Security Group" + --egress --description "Sample Security Group" SECURITY_GROUP - Does not implement Networking security groups, you can configure security group rules by using the :command:`openstack security group rule @@ -323,8 +323,8 @@ you are using. If you are using a plug-in that: .. code-block:: console - $ openstack security group rule create default --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0 - $ openstack security group rule create default --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0 + $ openstack security group rule create --protocol icmp default + $ openstack security group rule create --protocol tcp --dst-port 22:22 default .. note:: diff --git a/doc/user-guide/source/cli-nova-configure-access-security-for-instances.rst b/doc/user-guide/source/cli-nova-configure-access-security-for-instances.rst index f009dada97..5aa6db3c51 100644 --- a/doc/user-guide/source/cli-nova-configure-access-security-for-instances.rst +++ b/doc/user-guide/source/cli-nova-configure-access-security-for-instances.rst @@ -175,8 +175,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`. .. code-block:: console - $ openstack security group rule create SECURITY_GROUP_NAME \ - --protocol icmp --dst-port -1:-1 --remote-ip 0.0.0.0/0 + $ openstack security group rule create --protocol icmp \ + SECURITY_GROUP_NAME This allows access to all codes and all types of ICMP traffic. @@ -185,8 +185,8 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`. .. code-block:: console - $ openstack security group rule create SECURITY_GROUP_NAME \ - --protocol icmp --dst-port -1:-1 --remote-group SOURCE_GROUP_NAME + $ openstack security group rule create --protocol icmp \ + --remote-group SOURCE_GROUP_NAME SECURITY_GROUP #. To allow access through a UDP port, such as allowing access to a DNS server that runs on a VM, choose one of the following options: @@ -196,16 +196,16 @@ see :doc:`../common/cli-set-environment-variables-using-openstack-rc`. .. code-block:: console - $ openstack security group rule create SECURITY_GROUP_NAME \ - --protocol udp --dst-port 53:53 --remote-ip 0.0.0.0/0 + $ openstack security group rule create --protocol udp \ + --dst-port 53:53 SECURITY_GROUP - Allow only IP addresses from other security groups (source groups) to access the specified port. .. code-block:: console - $ openstack security group rule create SECURITY_GROUP_NAME \ - --protocol udp --dst-port 53:53 --remote-group SOURCE_GROUP_NAME + $ openstack security group rule create --protocol udp \ + --dst-port 53:53 --remote-group SOURCE_GROUP_NAME SECURITY_GROUP Delete a security group rule ~~~~~~~~~~~~~~~~~~~~~~~~~~~~