From 03c8f74e982f0e90b05a23088b3f03630fc19b2b Mon Sep 17 00:00:00 2001 From: radhikap Date: Mon, 8 Jul 2013 16:55:56 +0530 Subject: [PATCH] CLOUDSTACK-2806 --- docs/en-US/add-gateway-vpc.xml | 9 +- docs/en-US/configure-acl.xml | 308 ++++++++++++++++--------- docs/en-US/images/replace-acl-icon.png | Bin 0 -> 930 bytes docs/en-US/images/replace-acl-list.png | Bin 0 -> 7706 bytes 4 files changed, 198 insertions(+), 119 deletions(-) create mode 100644 docs/en-US/images/replace-acl-icon.png create mode 100644 docs/en-US/images/replace-acl-list.png diff --git a/docs/en-US/add-gateway-vpc.xml b/docs/en-US/add-gateway-vpc.xml index 9a270f9d794..486cf84a824 100644 --- a/docs/en-US/add-gateway-vpc.xml +++ b/docs/en-US/add-gateway-vpc.xml @@ -144,10 +144,11 @@
ACL on Private Gateway The traffic on the VPC private gateway is controlled by creating both ingress and egress - network ACL rules. The ACLs contains both allow and deny rules. As per the rule, all the - ingress traffic to the private gateway interface and all the egress traffic out from the - private gateway interface are blocked. You can change this default behaviour while creating a - private gateway. + network ACL rules. The ACLs contains both allow and deny rules. In addition to the default ACL + rules, rules you might have created are also listed in the ACL drop-down list. As per the + rule, all the ingress traffic to the private gateway interface and all the egress traffic out + from the private gateway interface are blocked. You can change this default behaviour while + creating a private gateway.
Creating a Static Route diff --git a/docs/en-US/configure-acl.xml b/docs/en-US/configure-acl.xml index e7459e68dbf..1def9ea65cc 100644 --- a/docs/en-US/configure-acl.xml +++ b/docs/en-US/configure-acl.xml @@ -25,119 +25,197 @@ default, all incoming and outgoing traffic to the guest networks is blocked. To open the ports, you must create a new network ACL. The network ACLs can be created for the tiers only if the NetworkACL service is supported. - - - Log in to the &PRODUCT; UI as an administrator or end user. - - - In the left navigation, choose Network. - - - In the Select view, select VPC. - All the VPCs that you have created for the account is listed in the page. - - - Click the Configure button of the VPC, for which you want to configure load balancing - rules. - For each tier, the following options are displayed: - - - Internal LB - - - Public LB IP - - - Static NAT - - - Virtual Machines - - - CIDR - - - The following router information is displayed: - - - Private Gateways - - - Public IP Addresses - - - Site-to-Site VPNs - - - Network ACL Lists - - - - - Select Network ACL Lists. - The following default rules are displayed in the Network ACLs page: default_allow, - default_deny. - - - Click Add ACL Lists, and specify the following: - - - ACL List Name: A name for the ACL list. - - - Description: A short description of the ACL list - that can be displayed to users. - - - - - Select the ACL list. - - - Select the ACL List Rules tab. - To add an ACL rule, fill in the following fields to specify what kind of network traffic - is allowed in the VPC. - - - CIDR: The CIDR acts as the Source CIDR for the - Ingress rules, and Destination CIDR for the Egress rules. To accept traffic only from or - to the IP addresses within a particular address block, enter a CIDR or a comma-separated - list of CIDRs. The CIDR is the base IP address of the incoming traffic. For example, - 192.168.0.0/22. To allow all CIDRs, set to 0.0.0.0/0. - - - Protocol: The networking protocol that sources use - to send traffic to the tier. The TCP and UDP protocols are typically used for data - exchange and end-user communications. The ICMP protocol is typically used to send error - messages or network monitoring data. All supports all the traffic. Other option is - Protocol Number. - - - Start Port, End - Port (TCP, UDP only): A range of listening ports that are the destination - for the incoming traffic. If you are opening a single port, use the same number in both - fields. - - - Protocol Number: The protocol number associated - with IPv4 or IPv6. For more information, see Protocol - Numbers. - - - ICMP Type, ICMP - Code (ICMP only): The type of message and error code that will be - sent. - - - Action: What action to be taken. - - - - - Click Add. The ACL rule is added. - You can edit the tags assigned to the ACL rules and delete the ACL rules you have - created. Click the appropriate button in the Details tab. - - +
+ Creating ACL Lists + + + Log in to the &PRODUCT; UI as an administrator or end user. + + + In the left navigation, choose Network. + + + In the Select view, select VPC. + All the VPCs that you have created for the account is listed in the page. + + + Click the Configure button of the VPC. + For each tier, the following options are displayed: + + + Internal LB + + + Public LB IP + + + Static NAT + + + Virtual Machines + + + CIDR + + + The following router information is displayed: + + + Private Gateways + + + Public IP Addresses + + + Site-to-Site VPNs + + + Network ACL Lists + + + + + Select Network ACL Lists. + The following default rules are displayed in the Network ACLs page: default_allow, + default_deny. + + + Click Add ACL Lists, and specify the following: + + + ACL List Name: A name for the ACL list. + + + Description: A short description of the ACL list + that can be displayed to users. + + + + +
+
+ Creating an ACL Rule + + + Log in to the &PRODUCT; UI as an administrator or end user. + + + In the left navigation, choose Network. + + + In the Select view, select VPC. + All the VPCs that you have created for the account is listed in the page. + + + Click the Configure button of the VPC. + + + Select Network ACL Lists. + In addition to the custom ACL lists you have created, the following default rules are + displayed in the Network ACLs page: default_allow, default_deny. + + + Select the desired ACL list. + + + Select the ACL List Rules tab. + To add an ACL rule, fill in the following fields to specify what kind of network + traffic is allowed in the VPC. + + + CIDR: The CIDR acts as the Source CIDR for the + Ingress rules, and Destination CIDR for the Egress rules. To accept traffic only from + or to the IP addresses within a particular address block, enter a CIDR or a + comma-separated list of CIDRs. The CIDR is the base IP address of the incoming + traffic. For example, 192.168.0.0/22. To allow all CIDRs, set to 0.0.0.0/0. + + + Protocol: The networking protocol that sources + use to send traffic to the tier. The TCP and UDP protocols are typically used for data + exchange and end-user communications. The ICMP protocol is typically used to send + error messages or network monitoring data. All supports all the traffic. Other option + is Protocol Number. + + + Start Port, End + Port (TCP, UDP only): A range of listening ports that are the destination + for the incoming traffic. If you are opening a single port, use the same number in + both fields. + + + Protocol Number: The protocol number associated + with IPv4 or IPv6. For more information, see Protocol + Numbers. + + + ICMP Type, ICMP + Code (ICMP only): The type of message and error code that will be + sent. + + + Action: What action to be taken. + + + + + Click Add. The ACL rule is added. + You can edit the tags assigned to the ACL rules and delete the ACL rules you have + created. Click the appropriate button in the Details tab. + + +
+
+ Assigning a Custom ACL List to a Tier + + + Create a VPC. + + + Create a custom ACL list. + + + Add ACL rules to the ACL list. + + + Create a tier in the VPC. + Select the desired ACL list while creating a tier. + + Click OK. + +
+
+ Assigning a Custom ACL List to a Tier + + + Create a VPC. + + + Create a tier in the VPC. + + + Associate the tier with the default ACL rule. + + + Create a custom ACL list. + + + Add ACL rules to the ACL list. + + + Select the tier for which you want to assign the custom ACL. + + Click the Replace ACL List icon. + + + + + replace-acl-icon.png: button to replace an ACL list + + + The Replace ACL List dialog is displayed. + Select the desired ACL list. + Click OK. + +
diff --git a/docs/en-US/images/replace-acl-icon.png b/docs/en-US/images/replace-acl-icon.png new file mode 100644 index 0000000000000000000000000000000000000000..6a15d4565dd568f65e5ddd186e2ff11eb50b8bc5 GIT binary patch literal 930 zcmV;T16}-yP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D12;)TK~zXfwUv!e z5@8(2?~iNc*2*kj@f8%sFcp;-UqCaRr8b%7EUT@wQbd6RaMG$rN zKlH=fSi3vRP1?R=yU+7{KliZv9U!UG%>M`y3`f-{cKdvsS1G4wE%xh^zo)pQ{9eKRJ9i7_7S#XTYy+>^g{0Ew(Y-h=yoRRA>blZ04#hjWq|GgD zJig$|!V+8pui#YIaO;^xAU0P(kGqhQ)LCRFMoVdV<>>gt)bv}5_s9o&6@wjO+0wEO zE`h)M@Tr_r%`5`3toyUxWa@Ntd!H6KFX;^)Bu*$UmiAEI6`cVtfkQ-{VrCJD#p%s@ zkCW-p)*daj+y=dg$U#X@Umtk8WLngegMyY;W)TSP@Sv187}=$zx~^Vt!~v>SP}MTp zCF!QTQ!}%3-{ z@9VrPsF~fHI8NRqtX{1F)95jFFKgk3aB&$mTVa0L=In+F<~EG5k11zj2Z_9S37Zps zq{b$uNnaqHIYV&5_Humk_L+JAS*CTCb3gY@xR!=8IfMlQ0079Jt0?FI0KhnWIg12@ zf0q3$dyjts-E@@Y0Odn$IDCcBMpj)G0H};5y|e)1>$l#j7`Xue6rKNWV6SuGD*)hj z#d8H&J+GHL8QyQ{rZRfzPi?BtxM#)<;#GBKww)Xu9ajsxG+IpP3xwZc0c&&{*wG*j zLXx{ia(6IHXn`K#H31?MkX0~Ol&l;ThA9dxcZb4lgWYALEsjc#X1YV-!goPXN=kY7 z@81{oO*U=1?JPPHXP>X}kLt?Sm)|>416BQG@)!&(EZuaDGFL)XSSQ zkUM&;6h^P*l&w zokzzZ-c-`CJ$T#Ke6Eg_2%H6=V^Rc@D11O&<@GWYWpt9QsCGC*jS3HX>@G+w~@rK_do z_b(^0Ej4F=|1TlYRZDJB5Hz}*ns(fY9}@`@H$)6)58LW7#qYnS{-0)U;Kj=gFA$K| zfB7X7zKNF1I^OR5XDA&wv3=CydP)39Bva*>|j?p%L=zhuTZPZv4$ zl(|OI{HgmGn^>l`Fk~hRNllNysG2rTL`${jY}e13=lq_$8+P04llc-SHYJ#Ghqlq0FE-!}-Z z`nY>uJLhIaNps~Y+blW=#f~RA#65&+Fse58ZELwb)X|cbqjxMp>%~5j5V7+2>Q8#7 zP5O}~Mu+n@mQ{4#y&pv~|b;(7xvD~xaRR@f098Z(seZziqg6hM;8_z zb1VCoBM+%b)3Uip%`>xi7r4=U^PMu^wyd=f$B97i3ngQ1+F$x2{*y|9*Vgt&r|)OY z{oradna}(#xVMaRs_IqG(yKolH60flDl%(K#e5FkR9%C43klmVZ+CCW(N^boTgQzM zpC{0)zg|(-{2pVBj=<|QY~-4O)b~}X%9_sBQr(0Nd8}Qgg?{9q4ti#4StMBUVx;VD zb>s4=Qk#myq&iW>5bsFp))^5+>NAgfrF!fKlJ{JAS|tqAXyljGoXI|Eg+eJazDEbL zy$1n{@TPH}B;vU^9QD_9biTm#MoaS)U;G|oO&Sc=$o_QycL$1F+UrEz8ug=naa8=7 zZ++shQKY5-!pxL+NMOsd!h5>LW`A}Dw^e8|Npg4kPsZgbOf|jslqCqa*7)EX;mM{H zpK66v!@GAqP0Sa}3Lgx�=uZU^U4sZMt#k@?v>ISgrNO)Cxtj4WYE=VYUXrSL{V+ zEA*<_l76(%QR?-tCLY5M0eU6}Uj|SVnRy3)244+6H%}Q>d^f+PeRQ2}gyVLoayMJI z2L*#<^8f^s=~0qAzQS9}(mPH!L!q@d4bA5qb%91B4{wzQ^=h`Y?x^)ErQVzdT(}us zKYrp~HP1lrqn4SIv~R z^?N1knNgWbt7^F_Ia zhn98Bpz2K`;<28&98V(mCT*tq%2R00z{l%(f zP0;?jxYt(h90$C2EN2A@2=)w46D|aF4j-!(V5tucHKGR);Nf?V5qag<+oQxT z{<%Y(L-LE?PJRX0vKKA3OFr?KC?|^WY8Ih(|UI{XTU2Rf38u z-EZBf>HEQ?A6}iv9?%vVoRXngETgaq@nPItQ-T*s=DcR7B|CizVjDVap(~3W zW$u1zB&=ihsz}g$7#D86w`U?(OTW3MO<3G6&z>zNr{7q~*ZQ#}(rv}-otq9`7bQa^ zkQe5i%6c&vFR$I5;cSLGUrbiB3OCpqrpdmBzn!45ND>l2lu1jx>pbIVar54)-F?I1 zamn909o>nWFDtKeGxE!1elAuZA^Lj6E;%Sn~_j!VG^sg)5cjo(*-&swC4}JWwqPzWbO&tr9tHs4|i4<->Sh*E0 z2uBFHS~;^UFl5R8>THttvxXhb+vo5Ef*${p`SJ%#X#~5QW^8l#=o7b|t%jwr(ERK) z4THucN1b=w$=Wq*mo}7203v{R%%(E8(nT+Ax=__vY_l~nbTjSZ;jlPUsZdyJ(^LA} zVTT#N`v#^4?kw1wIqMz&qzxIPah(@UXBciW-)ekuSJM_G8#+m1n$GZ*`3nXvBRe@X zL;4{8@ov;Stcogv$=!8VPF4Cj?RKa7*)5|nY`AHs2&tevb8yocidNcg#fi}smwq_u zn%q|XZhBsu{!83_4~A@2y@X*B)NTD^a-IUz?k&5``qsVPD9mYeOABlko;`RG?lHq= zFOPlF01?RUT9gb3{tf_x~)9)`H)n7IUIzIVthH@m~~U@FaaP`e4wkYi>_>@#@WS$hv18pY+Jt$k8s= z?zL~Z$2!~I>GJVppm)(_dqVvmu>}deckZL}r1NZ(a@O725Qt0=Knn@9$EJgIjN70Hw+ovbGK-U14CodQapN}`{(Aky(>Pxc& zss2k^ezxO#A;|yh#RNuZlNANVp+0J1WPzsjJ`G$-K)8>s@a8|(PE8L$Q|;p6K``L~ z>GacAx|CAL$VLXzV>*X><{X7=zmALi6l^Lit_B4(I-PmIDG~V5WPn$^OG0QLu8jvt z<(Y)DU$tB7Fx9ho4D?Mb94~#zVcEt@A;Q0?hOp*%z|IXdqg#21lY8jN*T$j^I1cw) zu-Io!kTvID4UUG(YQ$)PK;r*q3qX?{>NB6DFbIW$u66#`7Jy`nwugaNN*$DR0_C7f z)f3`2*5^yjv|dOM3omlZz^cPv(#+2^JrKESC8cHR2p-=`-Sjpvp*@{y2T>R@Qo4PFz+ipoAkRJZ%l>=N7v4Xi`gx1StHjzFt22u)R~FZZ(SMuY(qTqh zzG6QxfWr*T0}lfaq7Mk*=ZfL=(xmU9o_u4=JKgg@j=06 zs;bVtgr5Dn+HZ2u_CvA2$BHcdF0;r@~fRn3&#*7xypo1hf==~$&N`@KbMKdAmOdX`;_Hr7E zEahK~Zt2U%vIibbOa&I4T-2-THbP7H3~)K$%Lt#eliy0x?oll2Z=v!5!ZAtqU@t^1 zxzr~sV}gOJLj^CL7e5Przuj%Pox)BLZ94m@X6X-~nmB1iot~7Bq=2Y<;L_dJ*q`gf z^6rV>YoV?t-57b|kYOivRX!nazo?RdGyZI8WVhdk4+<-*cfWzkbLp0XCNBSkv(X|a z^fPz%i;o`@v{Ts2IBsd*(AkM(*H>VVzR!==Rd7hMU2o1#x`^GcHAS8CJF(YahT%Ho zvq2|#2}{7Z=Z)-58BGLwh@4D(Jes1fh_8&^9X^Q(QH&A}$+%4FAyz%EjE{TW_u$fz zXTr#+PnFk-qsi+n6hp9eyhJPZIuhOXJ=x9TB3}6(;<^5a%AFEFUsH`Yhszbvk3N4- zM|-~Kk|&YDuk;B^QRK&Z*iS1oaQCp@)ZU6gX83Vp<=s&Ks->_$uewwJjNDHHlrG7{ zRv8>%?3ld1rLEeGTyy*`G{hWK4#Yk|OTIH+cx4M4s$3+b+a+?6a0Vuq2&h8fFld4- zZ~qz){;rF9sSC@~Tf_rUGpZoR>PVuW*#~ldCaCTTZ2=|6O0i(#McAAq6=-)1+paHy zJF>5XWPNU$t~TC(r&o+7xFT5pWtp&xb>T?+Sa7Olrvg2cNC3k2^;aY{YT`*T5X-+% zdvVHA6rXvddc!Q+C=ljNHS+f5_I6#aiv<78RUd5=rOF8im+{OzzvyK20oHJ!lHS3^ z;GX%8QeA0K+HV~WxRdkYtqulcUg;E(3lBRybT42P(FI#qh{YVZFhQ?_C^t#e>SE|w z@3~RdR?d{P1<7*KF{kzA6nPp4cm&2JKOy`1B3VGsuR!N1&PgQh1>YO4qX8WM-II>i z=L&E+uKU=yKiW^zx(C0zDbR95GN|0(vOn&{s;>umY#dvOtx?0-A9IAJocYUs2Y zT7NLk*qz)H4$V6jTQW}t0VZud4AZCP7A|0O1GWUPRJY-PANdH*zF3=-WmQU{8mCWe ziYBOzEaVV9+UZj%mhkD3Y3(k}W_ITQFk$Ghv|kz+3{uj@^e%D{v)BO#dW%t_6#%m$ z%^iWxEaWwPmi>f(eNyMW*xMW!9g+7(r{IQR00P&J%K6v=Vh>uiGGB@$fCCsfMWIW? z_$XtB>Ut#2$evNiWTF3=cyO(g$yp94%>zJyMbRr{xZ6Q_QBTTM7k)b}5Wty!o~hyE zApv^D-7EHP)R15yurzvyOh5R9+TzTDZKYz79S~4MU@+WzA>jXT2>^Qr%b8k*sM*l! zI8^GiI?mktI+#7)<8!FQ0)~=KUOx3BL0*SH5QWN26%%EIncyf8IDOy=_2g>rn#2*= zbC|8q4~wwQ1h9<)|FeJY2*XTOKmhQti``~|WGNRyjS=EZOJM@^<*XpJNu!>O1mfs; zArz+zjK$DMAFbitB#so%AjS=mX`MP5T$kdo3C&<#s4nIndVXPT`9U?D2%vVg8-eC! z3Ys8rpXFVm`L|?$Sj@zARrU#o-UlUX^^evHgn}c^^n(zD$yEXh7dl^pCcJ+`Wg}jG zgC!mMcNV1Y($HkHsXl%Uga_=DhoNf-4UmsU#?LHyMJ9Az@+6vg>Hd^}X3ILCI0Xu8 z4JPrqfzecrOo~7NsS8J4N{6L;Cp7Ce8vRz!3fyE}p_>;8m^+dK%0sgj#9`6Ryc*o* zc+{!<>65td1}k;9;awPE&O+X$1E2vgyuge;=@rD5xOCC?#3C0EJ^nX8*y=;x_DzbR z0c3#+;)MdFxf`|sV zf(3Wr8wihg(zn`&xkgoDDJ+8nEbA0{;2NWU20HI>uBT3R%7o+f|%Qd9wQWRsgrYyb3F_#8YZt0 z?vj&a3NZMuFLsxvSc68GYkcXcXvh<=Byiwya#b@j1VM@!)$OGiZvw!J$Bda3YGA7n z__wI$F!^uFBMuBA_lBv})0qkvz&k9CcyItEzux3YSW&i?eo88lK*o69;_ISGV%bq+ zU8hv|Cm&#j2YKb8)PdOmBp3mN14ojAQPjpDQq7&BJQ+jHUyTum$}#K<6&oR;UxQKA z#B#i~-pN$4YlWwm2*Z=ss;a63L7VcIZKnQLO&|g^D4Um9nN{hxk=#D5%%&81?sk#* zz2xH3mbcke2ghY55#$(1%n&K?U^))?S9y+mdnw+0S~EM}5>otBr+b((7tPKGr;rMI3iX#x4T7h1P! z7B(MYJYS}ZJ>))eiG~78>Y8R54}oy@w`)1drz&h5k*w&*oPJC2Us4!Hv&$bk8%%N0 zes>~)nry?$Jr_S%%%byKJS=t zm~n2t^B`ob2VUN5J-L(QAB{d$dG0l%?D*bIqD4G+^lR6{{<|&2Z=@+dzqbG9C;#k_ zC06>eN!_SE>UqS! z-9r0ZAnc$r7`xJv!|s-h&MI~4Z~~T*@j8#$0So>Y)52-qdQ?TP0gL=p5cfq{Q3rNIi8KidP=qxfLx#y>`=JAiZ12Nm-m8upjw zqkA1mZ&8^0ycH{zE3J0AW{R#MHY)iB*ZU;BMwD@vfY3Kk#P0$KyAQ=3XYNBHzF*$A zz}VSpIdwC8J?;H-C2Gq8K=1&QUnHtnA3ka!f#>%qt=4g1AYXQ!E4=xGRw(J%)yw-J16?bWtNe%6U;JQayN6i|RYdKc zdZH`zcMuCtQvJ}ek3;ibGX^^cKE%h1Z{J4d)YaRVkgLP|U~_!y+h|(~lKhV#It!jf z`@~0ue)U97{ttZn0#$~axm`clb5Qb^gaemP^X>JcHCC1q$~s4vo_2UcK$97B_5P1J zkgHP4rqTo(mAzhpoU#0$I*|BX4ko?G7|a{m{K3=D7oWtue|rn_CWt=6 zXlRY{oO5jqXc;+x-Swis)AHmHqvK2ONyZ7Y7Kqo4Ku(O#Z%5+Xq+!hq*3%0r76UA? zbFN~R5vG0Z(acaY34yuaY!*epM*y{50vT75)ws}WbGatP>Dkeo>6Tb@X@=~?6;Uqv`E$?AhVEiN6=l9Y6VKMh;kGdT0EiT~D1= zv=?hT23IRPPveNBSH^7awi4^g2Mz7AL#p`o^@UPjIF^+`UQ}FI%+#qQxALWo?Z`M; z@Yb=AGj+Laq4l_*o3bJE^834B5!ErbC6o@0ATNV1Z7K5S2tMkY%GUrVTfFzf(0VsU zT9*T~7!0Ta6lur;2P6jst?pmQ6G5r;AYAtgrjdC)aur!Rw9&We z@tJE(#P;mhnvU_r_$M6H44klk349i&(yDiCbX3lGPP``c{t(H(bHca^853U{4UM7r z?nwEA!^39Z-H!i$9W?19rpgx-N}~S$jhm@{O~1mZm7X`(^k33WSO%gq*_o}49I@+* z{}B}xH}m(45bxv1`#-beXPeHmCcxyO_=7$}$kV4^VmPEL{brs(O1+F*6I0J_rcsn^ UV^o>*0Q~h_QA43z4)Ol~0dWDLRsaA1 literal 0 HcmV?d00001