Skip to content

Instantly share code, notes, and snippets.

@vbrinza
Created March 2, 2016 09:51
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save vbrinza/2243477f2e26f5955e7b to your computer and use it in GitHub Desktop.
Save vbrinza/2243477f2e26f5955e7b to your computer and use it in GitHub Desktop.
[root@openstack ~(keystone_test)]# neutron security-group-list
+--------------------------------------+--------------+----------------------------------------------------------------------+
| id | name | security_group_rules |
+--------------------------------------+--------------+----------------------------------------------------------------------+
| 4df44f83-6189-4c85-abc5-434808fa338b | centos-rules | egress, IPv4, 1-65535/tcp, remote_ip_prefix: 0.0.0.0/0 |
| | | egress, IPv4, icmp, remote_ip_prefix: 0.0.0.0/0 |
| | | ingress, IPv4, 1-65535/tcp, remote_ip_prefix: 0.0.0.0/0 |
| | | ingress, IPv4, icmp, remote_ip_prefix: 0.0.0.0/0 |
| 60e4d68a-186c-43f0-bf3a-64e93e196b44 | default | egress, IPv4 |
| | | egress, IPv6 |
| | | ingress, IPv4, remote_group_id: 60e4d68a-186c-43f0-bf3a-64e93e196b44 |
| | | ingress, IPv6, remote_group_id: 60e4d68a-186c-43f0-bf3a-64e93e196b44 |
+--------------------------------------+--------------+----------------------------------------------------------------------+
[root@openstack ~(keystone_test)]# neutron security-group-show centos-rules
+----------------------+--------------------------------------------------------------------+
| Field | Value |
+----------------------+--------------------------------------------------------------------+
| description | centos rules |
| id | 4df44f83-6189-4c85-abc5-434808fa338b |
| name | centos-rules |
| security_group_rules | { |
| | "remote_group_id": null, |
| | "direction": "ingress", |
| | "remote_ip_prefix": "0.0.0.0/0", |
| | "protocol": "tcp", |
| | "tenant_id": "f9832c1dc6c24239968621050c15abb9", |
| | "port_range_max": 65535, |
| | "security_group_id": "4df44f83-6189-4c85-abc5-434808fa338b", |
| | "port_range_min": 1, |
| | "ethertype": "IPv4", |
| | "id": "1587c6db-db02-4b96-a8b8-81f812a96c90" |
| | } |
| | { |
| | "remote_group_id": null, |
| | "direction": "egress", |
| | "remote_ip_prefix": "0.0.0.0/0", |
| | "protocol": "icmp", |
| | "tenant_id": "f9832c1dc6c24239968621050c15abb9", |
| | "port_range_max": null, |
| | "security_group_id": "4df44f83-6189-4c85-abc5-434808fa338b", |
| | "port_range_min": null, |
| | "ethertype": "IPv4", |
| | "id": "27288836-c382-425c-8c63-c663a2ef48e6" |
| | } |
| | { |
| | "remote_group_id": null, |
| | "direction": "ingress", |
| | "remote_ip_prefix": "0.0.0.0/0", |
| | "protocol": "icmp", |
| | "tenant_id": "f9832c1dc6c24239968621050c15abb9", |
| | "port_range_max": null, |
| | "security_group_id": "4df44f83-6189-4c85-abc5-434808fa338b", |
| | "port_range_min": null, |
| | "ethertype": "IPv4", |
| | "id": "9e38db06-def2-4437-a4a7-6a03375d23f5" |
| | } |
| | { |
| | "remote_group_id": null, |
| | "direction": "egress", |
| | "remote_ip_prefix": "0.0.0.0/0", |
| | "protocol": "tcp", |
| | "tenant_id": "f9832c1dc6c24239968621050c15abb9", |
| | "port_range_max": 65535, |
| | "security_group_id": "4df44f83-6189-4c85-abc5-434808fa338b", |
| | "port_range_min": 1, |
| | "ethertype": "IPv4", |
| | "id": "f0ab8f89-e5bc-4a75-b1d6-545e232052fc" |
| | } |
| tenant_id | f9832c1dc6c24239968621050c15abb9 |
+----------------------+--------------------------------------------------------------------+
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment