1EUCA-AUTHORIZE(1) User Commands EUCA-AUTHORIZE(1)
2
3
4
6 euca-authorize - Add a rule to a security group that allows traffic to
7 pass
8
10 euca-authorize [--egress] [-P PROTOCOL] [-p RANGE] [-t TYPE:CODE]
11
12 [-s CIDR | -o GROUP] [-u ACCOUNT] [--show-empty-fields]
13 [-U URL] [--region USER@REGION] [-I KEY_ID] [-S KEY] [--secu‐
14 rity-token TOKEN] [--debug] [--debugger] [--version] [-h] GROUP
15
17 Add a rule to a security group that allows traffic to pass
18
19 positional arguments:
20 GROUP name or ID of the security group to modify (required)
21
22 optional arguments:
23 --egress
24 [VPC only] manage an egress rule, which controls traffic leaving
25 the group
26
27 -P PROTOCOL, --protocol PROTOCOL
28 the protocol to affect (Non-VPC: tcp, udp, icmp) (VPC only: tcp,
29 udp, icmp, -1/all, other protocol numbers) (default: tcp)
30
31 -p RANGE, --port-range RANGE
32 range of ports (specified as "from-to") or a single port number
33 (required for tcp and udp)
34
35 -t TYPE:CODE, --icmp-type-code TYPE:CODE
36 ICMP type and code (specified as "type:code") (required for
37 icmp)
38
39 -s CIDR, --cidr CIDR
40 IP range (default: 0.0.0.0/0)
41
42 -o GROUP
43 [Non-VPC only] name of a security group with which to affect
44 network communication
45
46 -u ACCOUNT
47 ID of the account that owns the security group specified with -o
48
49 --show-empty-fields
50 show empty values as "(nil)"
51
52 -U URL, --url URL
53 compute service endpoint URL
54
55 --region USER@REGION
56 region and/or user names to search when looking up config file
57 data
58
59 -I KEY_ID, --access-key-id KEY_ID
60
61 -S KEY, --secret-key KEY
62
63 --security-token TOKEN
64
65 --debug
66 show debugging output
67
68 --debugger
69 launch interactive debugger on error
70
71 --version
72 show the program's version and exit
73
74 -h, --help
75 show this help message and exit
76
77
78
79euca2ools 3.4 December 2016 EUCA-AUTHORIZE(1)