[
https://issues.apache.org/jira/browse/CLOUDSTACK-8650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14636830#comment-14636830
]
ASF GitHub Bot commented on CLOUDSTACK-8650:
--------------------------------------------
Github user franklouwers commented on the pull request:
https://github.com/apache/cloudstack/pull/601#issuecomment-123706604
All,
I'll check the typo (I know how it happend) later this afternoon. Will also
provide logs both before (bad behaviour: rule not installed) and after (good
thing: rule installed) later today.
> When using security groups, adding an ingress rule for protocol "all" for
> source cidr 0.0.0.0/0 is impossible
> -------------------------------------------------------------------------------------------------------------
>
> Key: CLOUDSTACK-8650
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-8650
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Reporter: Frank Louwers
> Priority: Minor
>
> While it is possible to add ingress rules for tcp, udp and icmp for source
> range 0.0.0.0/0, it is currently impossible to add a rule for protocol all
> for source range 0.0.0.0/0.
> So these work (using eg cloudmonkey):
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=tcp
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=icmp
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/1"
> protocol=all
> * authorize securitygroupingress securitygroupid=$id cidrlist="128.0.0.0/1"
> protocol=all
> But this doesn't work:
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=all
> Fix is in https://github.com/apache/cloudstack/pull/601
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)