Listing outbound firewall rules
To check that all the required outbound allow rules apply to your network
Use the following command:
vinfra cluster network show <network>
<network>
- Network ID or name
For example, to view the outbound allow rules of the Public
network, run:
# vinfra cluster network show Public +---------------------+---------------------------------------------+ | Field | Value | +---------------------+---------------------------------------------+ | id | c2e799f5-c41d-4865-bcce-06b471affed6 | | inbound_allow_list | [] | | inbound_deny_list | [] | | name | Public | | outbound_allow_list | - 0.0.0.0:tcp:8888:Internal management | | | - 0.0.0.0:tcp:80:HTTP | | | - 0.0.0.0:tcp:443:HTTPS | | | - 0.0.0.0:udp:53:DNS | | | - 0.0.0.0:tcp:53:DNS | | | - 0.0.0.0:udp:123:NTP | | | - 0.0.0.0:tcp:8443:ABGW registration | | | - 0.0.0.0:tcp:44445:ABGW Geo-replication | | | - 0.0.0.0:tcp:9877:Acronis Cyber Protect | | | - 0.0.0.0:tcp:5900-6079:VM VNC Legacy | | | - 0.0.0.0:udp:4789:VXLAN | | | - 0.0.0.0:tcp:15900-16900:VM VNC | | traffic_types | Backup (ABGW) public,Compute API,iSCSI,NFS, | | | S3 public,Self-service ...<truncated> | | vlan | 0 | +---------------------+---------------------------------------------+