Listing outbound firewall rules
To check that all the required outbound allow rules apply to your network
Use the following command:
vinfra cluster network show <network>
<network>
- Network ID or name
For example, to view the outbound allow rules of the Public
network, run:
# vinfra cluster network show Public +---------------------+---------------------------------------------+ | Field | Value | +---------------------+---------------------------------------------+ | encryption | status: disabled | | | subnets: | | | - cidr: 10.100.10.0/20 | | | status: disabled | | id | c2e799f5-c41d-4865-bcce-06b471affed6 | | inbound_allow_list | [] | | inbound_deny_list | [] | | name | Public | | outbound_allow_list | - 0.0.0.0:udp:500:IKE | | | - 0.0.0.0:udp:4500:IKE | | | - 0.0.0.0:tcp:8888:Admin panel | | | - 0.0.0.0:tcp:80:HTTP | | | - 0.0.0.0:tcp:443:HTTPS | | | - 0.0.0.0:udp:53:DNS | | | - 0.0.0.0:tcp:53:DNS | | | - 0.0.0.0:udp:123:NTP | | | - 0.0.0.0:tcp:8443:ABGW registration | | | - 0.0.0.0:tcp:44445:ABGW Geo-replication | | | - 0.0.0.0:tcp:9877:Acronis Cyber Protect | | | - 0.0.0.0:tcp:5900-6079:VM VNC Legacy | | | - 0.0.0.0:tcp:15900-16900:VM VNC | | | - 0.0.0.0:udp:4789:VXLAN | | | - 0.0.0.0:udp:2049:NFS | | | - 0.0.0.0:tcp:2049:NFS | | | - 0.0.0.0:tcp:111:NFS Rpcbind | | | - 0.0.0.0:any:0:Allow all | | traffic_types | Backup (ABGW) public,Compute API,iSCSI,NFS, | | | S3 public,Self-service ...<truncated> | | vlan | 0 | +---------------------+---------------------------------------------+