Listing outbound firewall rules

To check that all the required outbound allow rules apply to your network

Use the following command:

vinfra cluster network show <network>
<network>
Network ID or name

For example, to view the outbound allow rules of the Public network, run:

# vinfra cluster network show Public
+---------------------+---------------------------------------------+
| Field               | Value                                       |
+---------------------+---------------------------------------------+
| id                  | c2e799f5-c41d-4865-bcce-06b471affed6        |
| inbound_allow_list  | []                                          |
| inbound_deny_list   | []                                          |
| name                | Public                                      |
| outbound_allow_list | - 0.0.0.0:tcp:8888:Internal management      |
|                     | - 0.0.0.0:tcp:80:HTTP                       |
|                     | - 0.0.0.0:tcp:443:HTTPS                     |
|                     | - 0.0.0.0:udp:53:DNS                        |
|                     | - 0.0.0.0:tcp:53:DNS                        |
|                     | - 0.0.0.0:udp:123:NTP                       |
|                     | - 0.0.0.0:tcp:8443:ABGW registration        |
|                     | - 0.0.0.0:tcp:44445:ABGW Geo-replication    |
|                     | - 0.0.0.0:tcp:9877:Acronis Cyber Protect    |
|                     | - 0.0.0.0:tcp:5900-6079:VM VNC Legacy       |
|                     | - 0.0.0.0:udp:4789:VXLAN                    |
|                     | - 0.0.0.0:tcp:15900-16900:VM VNC            |
| traffic_types       | Backup (ABGW) public,Compute API,iSCSI,NFS, |
|                     | S3 public,Self-service ...<truncated>       |
| vlan                | 0                                           |
+---------------------+---------------------------------------------+