AuthorizeSecurityGroupIngress

GET /?Action=AuthorizeSecurityGroupIngress
Description

Adds one or more ingress rules to a security group.
The modifications are effective at instance level as quickly as possible, but a small delay may occur.
In the public Cloud, this action allows one or more CIDR IP address ranges to access a security group for your account, or allows one or more security groups (source groups) to access a security group for your own 3DS OUTSCALE account or another one.
In a Virtual Private Cloud (VPC), this action allows one or more CIDR IP address ranges to access a security group for your VPC, or allows one or more other security groups (source groups) to access a security group for your VPC. All the security groups must be for the same VPC.
To create a rule with a specific IP protocol and a specific port range, we recommend using a set of IP permissions. We also recommend specifying the protocol in a set of IP permissions.

Note

By default, traffic between two security groups is allowed through both public and private IP addresses. To restrict it to private IP addresses only, contact our Support team: support@outscale.com.

Body parameter

Required: false
Name: AuthorizeSecurityGroupIngressRequest

Name Description Required Schema Default Example

CidrIp

The CIDR IP address range.

false

string

FromPort

The beginning of the port range for the TCP and UDP protocols, or an ICMP type number.

false

integer

GroupId

The ID of the security group.

false

string

GroupName

The name of the security group, if you are in the public Cloud.

false

string

IpPermissions.N

Describes a security group rule.

false

IpPermission

IpProtocol

The IP protocol name (tcp, udp, icmp) or protocol number. By default, -1, which means all protocols.

false

string

SourceSecurityGroupName

The name of the source security group (cannot be combined with the FromPort, ToPort, CidrIp and IpProtocol parameters).

false

string

SourceSecurityGroupOwnerId

The 3DS OUTSCALE account ID of the owner of the source security group, creating rules that grant full ICMP, UDP, and TCP access (cannot be combined with the FromPort, ToPort, CidrIp and IpProtocol parameters).

false

string

ToPort

The end of port range for the TCP and UDP protocols, or an ICMP type number.

false

integer

Responses
HTTP Code 200
HTTP Code Description Schema

200

AuthorizeSecurityGroupIngressResult

Response 200

Response 200

Name Description Required Schema Default Example

requestId

The ID of the request.

false

string

return

If true, the request succeeds. Otherwise, an error is returned.

false

boolean