Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

  
 
  

home | help
GCLOUD_COMPUTE_FIREWALL-RULEGeneralEComGCLOUD_COMPUTE_FIREWALL-RULES_CREATE(1)

NAME
       gcloud  compute	firewall-rules create -	create a Google	Compute	Engine
	      firewall rule

SYNOPSIS
       gcloud	compute	  firewall-rules   create    NAME    --allow	PROTO-
	      COL[:PORT[-PORT]],[PROTOCOL[:PORT[-PORT]],...]	   [--descrip-
	      tion DESCRIPTION]		[--network NETWORK; default="default"]
	      [--source-ranges CIDR_RANGE,[CIDR_RANGE,...]]
	      [--source-tags TAG,[TAG,...]]	 [--target-tags	TAG,[TAG,...]]
	      [GLOBAL-FLAG ...]

DESCRIPTION
       gcloud  compute	firewall-rules create is used to create	firewall rules
       to allow	incoming traffic to a network.

POSITIONAL ARGUMENTS
       NAME
	 The name of the firewall rule to create.

REQUIRED FLAGS
       --allow PROTOCOL[:PORT[-PORT]],[PROTOCOL[:PORT[-PORT]],...]
	 A list	of protocols and ports whose traffic will be allowed.

	 PROTOCOL is the IP protocol whose traffic will	be  allowed.  PROTOCOL
	 can  be  either the name of a well-known protocol (e.g., tcp or icmp)
	 or the	IP protocol number. A list of IP protocols  can	 be  found  at
	 http://www.iana.org/assignments/protocol-numbers/protocol-num-
	 bers.xhtml.

	 A port	or port	range can be specified after PROTOCOL to allow traffic
	 through  specific  ports. If no port or port range is specified, con-
	 nections through all ranges are allowed. For example,	the  following
	 will create a rule that allows	TCP traffic through port 80 and	allows
	 ICMP traffic:

	   $ gcloud compute firewall-rules create MY-RULE --allow tcp:80 icmp

	 TCP and UDP rules must	include	a port or port range.

OPTIONAL FLAGS
       --description DESCRIPTION
	 A textual description for the firewall	rule.

       --network NETWORK; default="default"
	 The network to	which this rule	is attached. If	omitted, the  rule  is
	 attached to the default network.

       --source-ranges CIDR_RANGE,[CIDR_RANGE,...]
	 A  list of IP address blocks that are allowed to make inbound connec-
	 tions that match the firewall rule to the instances on	 the  network.
	 The   IP   address   blocks   must   be  specified  in	 CIDR  format:
	 http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing.

	 If neither --source-ranges nor	--source-tags is provided,  then  this
	 flag will default to 0.0.0.0/0, allowing all sources. Multiple	IP ad-
	 dress blocks can be specified if they are separated by	spaces.

       --source-tags TAG,[TAG,...]
	 A list	of instance tags indicating the	set of instances on  the  net-
	 work which may	make network connections that match the	firewall rule.
	 If omitted, all instances on the network can  make  connections  that
	 match the rule.

	 Tags can be assigned to instances during instance creation.

       --target-tags TAG,[TAG,...]
	 A  list  of instance tags indicating the set of instances on the net-
	 work which may	make accept inbound connections	that match  the	 fire-
	 wall  rule.  If omitted, all instances	on the network can receive in-
	 bound connections that	match the rule.

	 Tags can be assigned to instances during instance creation.

GLOBAL FLAGS
       Run $ gcloud help for a description of flags available to all commands.

				       GCLOUD_COMPUTE_FIREWALL-RULES_CREATE(1)

NAME | SYNOPSIS | DESCRIPTION | POSITIONAL ARGUMENTS | REQUIRED FLAGS | OPTIONAL FLAGS | GLOBAL FLAGS

Want to link to this manual page? Use this URL:
<https://www.freebsd.org/cgi/man.cgi?query=gcloud_compute_firewall-rules_create&sektion=1&manpath=FreeBSD+12.0-RELEASE+and+Ports>

home | help