def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # Find all fabric nodes and print a summary of each node's # operational state all_raw_fns = api_client.fabric.Nodes.list() print("***** Showing summaries for %d fabric nodes" % all_raw_fns.result_count) all_fns = [] for raw_fn in all_raw_fns.results: # Fabric Nodes are polymorphic, so convert to a concrete class node_type = raw_fn.convert_to(Node).resource_type if node_type == "HostNode": all_fns.append(raw_fn.convert_to(HostNode)) elif node_type == "EdgeNode": all_fns.append(raw_fn.convert_to(EdgeNode)) for fn in all_fns: print_node(fn) print_node_status( fn, api_client.fabric.nodes.Status.get(fn.id, source="realtime")) interfaces = api_client.fabric.nodes.network.Interfaces.list(fn.id) print(" Interfaces:") for interface in interfaces.results: if_stats = api_client.fabric.nodes.network.interfaces.Stats.get( fn.id, interface.interface_id) print_interface_and_stats(fn, interface, if_stats) print("")
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # Create a pretty printer to make the output look nice. pp = PrettyPrinter() # Create a transport zone, but intentionally pass an incorrect # overlay type, so we cause an error. new_tz = TransportZone( transport_type="zappa", # invalid overlay type display_name="My transport zone", description="Transport zone for error handling demo", host_switch_name="hostswitch1") try: result_tz = api_client.TransportZones.create(new_tz) except Error as ex: print ex api_error = ex.data.convert_to(ApiError) print("An error occurred: %s" % api_error.error_message) # You can also extract the HTTP response code print("HTTP response code %d" % api_client._stub_config._response_extractor.get_http_status())
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) pp = PrettyPrinter() # Find all logical switches and show statistics for each. all_ls = api_client.LogicalSwitches.list() print("***** Showing statistics for %d logical switches" % all_ls.result_count) for ls in all_ls.results: print("Logical switch %s (id %s)" % (ls.display_name, ls.id)) # Retrieve the statistics for the switch stats = api_client.logical_switches.Statistics.get(ls.id) print_l2_stats(stats) print("") # Find all logical ports and show statistics for each. all_lps = api_client.LogicalPorts.list() print("***** Showing statistics for %d logical ports" % all_lps.result_count) for lp in all_lps.results: # Show the port's name and id, the logical switch it's on, # and what it's attached to, if anything. print("Logical port %s (id %s)" % (lp.display_name, lp.id)) print(" On switch %s" % lp.logical_switch_id) attachment = ("None" if lp.attachment is None else "%s %s" % (lp.attachment.attachment_type, lp.attachment.id)) print(" Attached to: %s" % attachment) # Retrieve the statistics for the port. if lp.attachment and lp.attachment.attachment_type == "VIF": stats = api_client.logical_ports.Statistics.get(lp.id, source="cached") else: stats = api_client.logical_ports.Statistice.get(lp.id) print_l2_stats(stats) print("") # Find all logical router ports and show statistics for each. all_lrps = api_client.LogicalRouterPorts.list() print("***** Showing statistics for %d logical router ports" % all_lrps.result_count) for lrp in all_lrps.results: # Show the port's type, name and id and what it's attached to, # if anything. # Since logical router ports are polymorphic, convert to the # base class so we can retrieve the type information. lrp = lrp.convert_to(LogicalRouterPort) print("%s %s (id %s)" % (lrp.resource_type, lrp.display_name, lrp.id)) stats = api_client.logical_router_ports.Statistics.get(lrp.id, source="cached") print_lrp_stats(stats)
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # Create a pretty printer to make the output look nice. pp = PrettyPrinter() t = api_client.telemetry.Config.get() pp.pprint(t)
def main(): arg_parser = getargs.get_arg_parser() arg_parser.add_argument("-s", "--remote_ssh_server", type=str, required=True, help="remote ssh server") arg_parser.add_argument("-w", "--remote_ssh_user", type=str, required=True, help="remote ssh username") arg_parser.add_argument("-c", "--remote_ssh_password", type=str, required=True, help="remote ssh password") arg_parser.add_argument("-f", "--remote_ssh_fingerprint", type=str, required=True, help="remote ssh SHA256 fingerprint") args = arg_parser.parse_args() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) pp = PrettyPrinter() # Get the UUID of the manager node we're talking to. We'll # request a support bundle from it. mgr_node = api_client.cluster.Nodes.get("self") mgr_uuid = mgr_node.id print(mgr_uuid) protocol = SupportBundleFileTransferProtocol( name="SCP", authentication_scheme=SupportBundleFileTransferAuthenticationScheme( scheme_name="PASSWORD", username=args.remote_ssh_user, password=args.remote_ssh_password ), ssh_fingerprint=args.remote_ssh_fingerprint ) rfs = SupportBundleRemoteFileServer( directory_path="/tmp", server=args.remote_ssh_server, protocol=protocol ) sb_request = SupportBundleRequest( log_age_limit=1, nodes=[mgr_uuid], remote_file_server=rfs ) try: resp = api_client.administration.SupportBundles.collect(sb_request) pp.pprint(resp) except Error as ex: api_error = ex.data.convert_to(ApiError) print("An error occurred: %s" % api_error.error_message)
def main(): args = getargs.getargs() # Create a pretty printer to make the output look nice. pp = PrettyPrinter() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # First, list all switching profiles. swps = api_client.SwitchingProfiles.list() print("Initial list of switching profiles - %d profiles" % swps.result_count) # Since switching profiles are polymorphic, we need to convert # each profile to its concrete class for raw_profile in swps.results: concrete_type_name = raw_profile.to_dict()["resource_type"] concrete_type = getattr(model_client, concrete_type_name) profile = raw_profile.convert_to(concrete_type) pp.pprint(profile) # Create a new QOS switching profile new_profile = QosSwitchingProfile(class_of_service=None, dscp=None, shaper_configuration=None, description="", display_name="My QoS Policy", tags=[]) result_profile = api_client.SwitchingProfiles.create( new_profile).convert_to(QosSwitchingProfile) print("Switching profile created. id is %s" % result_profile.id) # Save the id, which uniquely identifies the resource we created. profile_id = result_profile.id # Read that switching profile. read_profile = api_client.SwitchingProfiles.get(profile_id).convert_to( QosSwitchingProfile) print("Re-read the QOS switching profile") pp.pprint(read_profile) # Delete the switching profile api_client.SwitchingProfiles.delete(profile_id) print("After deleting QOS switching profile")
def main(): arg_parser = getargs.get_arg_parser() arg_parser.add_argument("port1", metavar="PORT_ID_1", type=str, nargs="?", help="Logical port 1") arg_parser.add_argument("port2", metavar="PORT_ID_2", type=str, nargs="?", help="Logical port 2") args = arg_parser.parse_args() # Verify exactly 0 or 2 ports were given ports = [x for x in [args.port1, args.port2] if x is not None] if len(ports) not in (0, 2): arg_parser.error("Give exactly two logical port IDs, or none to " "get a list of logical ports.") api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) pp = PrettyPrinter() # Find all logical ports all_lps = api_client.LogicalPorts.list().results lp_ids = [lp.id for lp in all_lps] fail = False for port in ports: if port not in lp_ids: print("Logical port %s not found" % port) fail = True if fail: sys.exit(1) print("Checking forwarding path between %s and %s" % (args.port1, args.port2)) if len(ports) == 0: # Print all the ports for lp in all_lps: # Show the port's name and id, the logical switch it's on, # and what it's attached to, if anything. print("Logical port %s (id %s)" % (lp.display_name, lp.id)) print(" On switch %s" % lp.logical_switch_id) attachment = ("None" if lp.attachment is None else "%s %s" % (lp.attachment.attachment_type, lp.attachment.id)) print(" Attached to: %s" % attachment) else: # Print forwarding path path = api_client.logical_ports.ForwardingPath.get(ports[0], ports[1]) pp.pprint(path)
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # List all of the fabric nodes result = api_client.fabric.Nodes.list() # Iterate over the results for vs in result.results: fn = vs.convert_to(Node) print("Type: %s, Name: %s, id: %s" % (fn.resource_type, fn.display_name, fn.id)) fn_status = status_svc.get(fn.id) print(" mp conn: %s, cp conn: %s" % (fn_status.mpa_connectivity_status, fn_status.lcp_connectivity_status))
def main(): args = getargs.getargs() # Create a pretty printer to make the output look nice. pp = PrettyPrinter() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # Create an IP Pool new_pool = IpPool(display_name="My IP Pool", description="IP Pool for IP Pool demo", subnets=[ IpPoolSubnet(cidr="192.168.1.0/24", allocation_ranges=[ IpPoolRange(start="192.168.1.10", end="192.168.1.20") ]) ]) result_pool = api_client.pools.IpPools.create(new_pool) print("IP Pool created. id is %s" % result_pool.id) # Allocate an IP address alloc = AllocationIpAddress(allocation_id="192.168.1.11") api_client.pools.IpPools.allocateorrelease( pool_id=result_pool.id, allocation_ip_address=alloc, action=api_client.pools.IpPools.ALLOCATEORRELEASE_ACTION_ALLOCATE) # Show the allocations allocs = api_client.pools.ip_pools.Allocations.list(result_pool.id) pp.pprint(allocs) # Deallocate the IP address api_client.pools.IpPools.allocateorrelease( pool_id=result_pool.id, allocation_ip_address=alloc, action=api_client.pools.IpPools.ALLOCATEORRELEASE_ACTION_RELEASE)
def main(): args = getargs.getargs() # Create a pretty printer to make the output look nice. pp = PrettyPrinter() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # First, list all transport zones. If your NSX installation has # just been installed, this should return an empty list. tzs = api_client.TransportZones.list() print("Initial list of transport zones - %d zones" % tzs.result_count) pp.pprint(tzs) # Create a transport zone. new_tz = TransportZone( transport_type=TransportZone.TRANSPORT_TYPE_OVERLAY, display_name="My transport zone", description="Transport zone for basic create/read/update/delete demo", host_switch_name="hostswitch1") result_tz = api_client.TransportZones.create(new_tz) print("Transport zone created. id is %s" % result_tz.id) # Save the id, which uniquely identifies the resource we created. tz_id = result_tz.id # Read that transport zone. read_tz = api_client.TransportZones.get(tz_id) print("Re-read the transport zone") pp.pprint(read_tz) # List all transport zones again. The newly created transport # zone will be in the list. tzs = api_client.TransportZones.list() print("Updated list of transport zones - %d zones" % tzs.result_count) pp.pprint(tzs) print("You can now examine the list of transport zones in the") print("NSX manager if you wish. Press enter to continue.") sys.stdin.readline() # Update the transport zone. read_tz.description = "Updated description for transport zone" updated_tz = api_client.TransportZones.update(tz_id, read_tz) print("After updating description. Note that the revision property is " "automatically updated.") pp.pprint(updated_tz) # Update the transport zone again. # # Note that NSX insists that clients always operate on up-to-date # data. To enforce this, every resource in NSX has a "revision" # property that is automatically maintained by NSX and is # incremented each time the resource is updated. If a client # submits an update operation, and the revision property in the # payload provided by the client does not match the revision # stored on the server, another update must have happened since # the client last read the resource, and the client's copy is # therefore stale. In this case, the server will return a 412 # Precondition Failed error. This is intended to prevent clients # from clobbering each other's updates. To recover from this # error, the client must re-read the resource, apply any desired # updates, and perform another update operation. updated_tz.description = "Updated description again for transport zone" updated_tz = api_client.TransportZones.update(tz_id, updated_tz) print("After updating description again.") pp.pprint(updated_tz) # Delete the transport zone. api_client.TransportZones.delete(tz_id) print("After deleting transport zone") # Now if we try to read the transport zone, we should get a # 404 Not Found error. This example also shows how you can # check for and handle specific errors from the NSX API. try: read_tz = api_client.TransportZones.get(tz_id) except NotFound: print("Transport zone is gone, as expected")
def main(): arg_parser = getargs.get_arg_parser() arg_parser.add_argument("-s", "--remote_ssh_server", type=str, required=True, help="remote ssh server") arg_parser.add_argument("-w", "--remote_ssh_user", type=str, required=True, help="remote ssh username") arg_parser.add_argument("-c", "--remote_ssh_password", type=str, required=True, help="remote ssh password") arg_parser.add_argument("-f", "--remote_ssh_fingerprint", type=str, required=True, help="remote ssh SHA256 fingerprint") arg_parser.add_argument("-g", "--remote_file_path", type=str, required=True, help="full path name of remote file to copy") args = arg_parser.parse_args() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) pp = PrettyPrinter() local_file_name = os.path.basename(args.remote_file_path) # Copy a file from a remote server to the NSX node protocol = ScpProtocol(name="scp", authentication_scheme=PasswordAuthenticationScheme( scheme_name="password", username=args.remote_ssh_user, password=args.remote_ssh_password), ssh_fingerprint=args.remote_ssh_fingerprint) remote_properties = CopyFromRemoteFileProperties( port=22, server=args.remote_ssh_server, uri=args.remote_file_path, protocol=protocol) try: api_client.node.FileStore.copyfromremotefile(local_file_name, remote_properties) print("Copied %s from %s to nsx node %s" % (local_file_name, args.remote_ssh_server, args.nsx_host)) except Error as ex: api_error = ex.data.convert_to(ApiError) print("An error occurred: %s" % api_error.error_message) # Then copy that file back from the NSX node remote_properties = CopyToRemoteFileProperties( port=22, server=args.remote_ssh_server, uri=args.remote_file_path, protocol=protocol) try: api_client.node.FileStore.copytoremotefile(local_file_name, remote_properties) print("Copied %s from nsx_node %s to %s" % (local_file_name, args.nsx_host, args.remote_ssh_server)) except Error as ex: api_error = ex.data.convert_to(ApiError) print("An error occurred: %s" % api_error.error_message)
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) # Create a pretty printer to make the output look nice. pp = PrettyPrinter() # Create a transport zone and logical switch. We only # need these so we can create logical ports. They aren't # part of the demo. tz = TransportZone(transport_type=TransportZone.TRANSPORT_TYPE_OVERLAY, display_name="Tagging Demo Transport Zone", description="Transport zone for tagging demo", host_switch_name="hostswitch") tz = api_client.TransportZones.create(tz) ls = LogicalSwitch( transport_zone_id=tz.id, admin_state=LogicalSwitch.ADMIN_STATE_UP, replication_mode=LogicalSwitch.REPLICATION_MODE_MTEP, display_name="ls-tag-demo", ) ls = api_client.LogicalSwitches.create(ls) # First, create a new group whose members are any logical # ports with a tag scope of "color" and tag value of "green" group = NSGroup( display_name="Green Logical Ports", description="All logical ports with scope=color and tag=green", membership_criteria=[ NSGroupTagExpression(resource_type="NSGroupTagExpression", target_type="LogicalPort", scope_op="EQUALS", scope="color", tag_op="EQUALS", tag="green") ]) green_group = api_client.NsGroups.create(group) # Now create another group for color:yellow logical ports. group = NSGroup( display_name="Yellow Logical Ports", description="All logical ports with scope=color and tag=yellow", membership_criteria=[ NSGroupTagExpression(resource_type="NSGroupTagExpression", target_type="LogicalPort", scope_op="EQUALS", scope="color", tag_op="EQUALS", tag="yellow") ]) yellow_group = api_client.NsGroups.create(group) # Now get the list of effective members (that is, logical ports # with color:green). There should be no effective members yet. print("Before creating any lports:") print_group_effective_members( "green group", api_client.ns_groups.EffectiveLogicalPortMembers.list(green_group.id)) print_group_effective_members( "yellow group", api_client.ns_groups.EffectiveLogicalPortMembers.list(yellow_group.id)) print("") # Create a logical port with color:green lport = LogicalPort(display_name="tagging-demo-lp1", admin_state=LogicalPort.ADMIN_STATE_UP, logical_switch_id=ls.id, tags=[Tag(scope="color", tag="green")]) lport = api_client.LogicalPorts.create(lport) print("Logical port for this test has id %s" % lport.id) print("") # Group membership is computed asynchronously in the NSX # manager. Wait a bit. time.sleep(2.0) # Find the effective members of the green and yellow groups. # Notice that the logical port is in the green group. print("After creating green lport:") print_group_effective_members( "green group", api_client.ns_groups.EffectiveLogicalPortMembers.list(green_group.id)) print_group_effective_members( "yellow group", api_client.ns_groups.EffectiveLogicalPortMembers.list(yellow_group.id)) print("") # Now modify the logical port's color to yellow. lport = api_client.LogicalPorts.get(lport.id) lport.tags = [Tag(scope="color", tag="yellow")] api_client.LogicalPorts.update(lport.id, lport) # Wait for group recalculation time.sleep(2.0) # Find the effective members of the green and yellow groups. # Notice that the logical port is now in the yellow group # and no longer in the green group. print("After changing lport color to yellow:") print_group_effective_members( "green group", api_client.ns_groups.EffectiveLogicalPortMembers.list(green_group.id)) print_group_effective_members( "yellow group", api_client.ns_groups.EffectiveLogicalPortMembers.list(yellow_group.id)) print("") # Now clear the tag lport = api_client.LogicalPorts.get(lport.id) lport.tags = [] api_client.LogicalPorts.update(lport.id, lport) # Wait for group recalculation time.sleep(2.0) # The port should be in neither group print("After removing lport color tag:") print_group_effective_members( "green group", api_client.ns_groups.EffectiveLogicalPortMembers.list(green_group.id)) print_group_effective_members( "yellow group", api_client.ns_groups.EffectiveLogicalPortMembers.list(yellow_group.id)) print("") print("Press enter to delete all resources created for this example.") sys.stdin.readline() # Delete all resources we created. api_client.LogicalPorts.delete(lport.id) api_client.NsGroups.delete(green_group.id) api_client.NsGroups.delete(yellow_group.id) api_client.LogicalSwitches.delete(ls.id) api_client.TransportZones.delete(tz.id)
def main(): args = getargs.getargs() api_client = auth.create_nsx_api_client(args.user, args.password, args.nsx_host, args.tcp_port, auth_type=auth.SESSION_AUTH) pp = PrettyPrinter() # Create a transport zone new_tz = TransportZone(transport_type=TransportZone.TRANSPORT_TYPE_OVERLAY, display_name="Two Tier App Demo Transport Zone", description="Transport zone for two-tier app demo", host_switch_name="hostswitch") demo_tz = api_client.TransportZones.create(new_tz) # Create a logical switch for the db tier new_ls = LogicalSwitch( transport_zone_id=demo_tz.id, admin_state=LogicalSwitch.ADMIN_STATE_UP, replication_mode=LogicalSwitch.REPLICATION_MODE_MTEP, display_name="ls-db", ) db_ls = api_client.LogicalSwitches.create(new_ls) # Create a logical switch for the web tier new_ls = LogicalSwitch( transport_zone_id=demo_tz.id, admin_state=LogicalSwitch.ADMIN_STATE_UP, replication_mode=LogicalSwitch.REPLICATION_MODE_MTEP, display_name="ls-web", ) web_ls = api_client.LogicalSwitches.create(new_ls) # Create a logical router that will route traffic between # the web and db tiers new_lr = LogicalRouter( router_type=LogicalRouter.ROUTER_TYPE_TIER1, display_name="lr-demo", failover_mode=LogicalRouter.FAILOVER_MODE_PREEMPTIVE) lr = api_client.LogicalRouters.create(new_lr) # Create a logical port on the db and web logical switches. We # will attach the logical router to those ports so that it can # route between the logical switches. # Logical port on the db logical switch new_lp = LogicalPort(admin_state=LogicalPort.ADMIN_STATE_UP, logical_switch_id=db_ls.id, display_name="dbTierUplinkToRouter") db_port_on_ls = api_client.LogicalPorts.create(new_lp) # Logical port on the web logical switch new_lp = LogicalPort(admin_state=LogicalPort.ADMIN_STATE_UP, logical_switch_id=web_ls.id, display_name="webTierUplinkToRouter") web_port_on_ls = api_client.LogicalPorts.create(new_lp) # Populate a logical router downlink port payload and configure # the port with the CIDR 192.168.1.1/24. We will attach this # port to the db tier's logical switch. new_lr_port = LogicalRouterDownLinkPort( subnets=[IPSubnet(ip_addresses=["192.168.1.1"], prefix_length=24)], linked_logical_switch_port_id=ResourceReference( target_id=db_port_on_ls.id), resource_type="LogicalRouterDownLinkPort", logical_router_id=lr.id) # Create the downlink port lr_port_for_db_tier = api_client.LogicalRouterPorts.create(new_lr_port) # Convert to concrete type lr_port_for_db_tier = lr_port_for_db_tier.convert_to( LogicalRouterDownLinkPort) # Populate a logical router downlink port payload and configure # the port with the CIDR 192.168.2.1/24. We will attach this # port to the web tier's logical switch. new_lr_port = LogicalRouterDownLinkPort( subnets=[IPSubnet(ip_addresses=["192.168.2.1"], prefix_length=24)], linked_logical_switch_port_id=ResourceReference( target_id=web_port_on_ls.id), resource_type="LogicalRouterDownLinkPort", logical_router_id=lr.id) # Create the downlink port lr_port_for_web_tier = api_client.LogicalRouterPorts.create(new_lr_port) lr_port_for_web_tier = lr_port_for_web_tier.convert_to( LogicalRouterDownLinkPort) # Now establish a firewall policy that only allows MSSQL # server traffic and ICMP traffic in and out of the db tier's # logical switch. # Create 3 firewall rules. The first will allow traffic used # by MS SQL Server to pass. This rule references a built-in # ns service group that includes all the common ports used by # the MSSQL Server. The ID is common to all NSX installations. MSSQL_SERVER_NS_GROUP_ID = "5a6d380a-6d28-4e3f-b705-489f463ae6ad" ms_sql_rule = FirewallRule(action=FirewallRule.ACTION_ALLOW, display_name="Allow MSSQL Server", ip_protocol=FirewallRule.IP_PROTOCOL_IPV4_IPV6, services=[ FirewallService( target_type="NSServiceGroup", target_id=MSSQL_SERVER_NS_GROUP_ID) ]) # The second rule will allow ICMP echo requests and responses. ICMP_ECHO_REQUEST_NS_SVC_ID = "5531a880-61aa-42cc-ba4b-13b9ea611e2f" ICMP_ECHO_REPLY_NS_SVC_ID = "c54b2d86-6327-41ff-a3fc-c67171b6ba63" icmp_rule = FirewallRule( action=FirewallRule.ACTION_ALLOW, display_name="Allow ICMP Echo", ip_protocol=FirewallRule.IP_PROTOCOL_IPV4_IPV6, services=[ FirewallService(target_type="NSService", target_id=ICMP_ECHO_REQUEST_NS_SVC_ID), FirewallService(target_type="NSService", target_id=ICMP_ECHO_REPLY_NS_SVC_ID) ]) # The third rule will drop all traffic not passed by the previous # rules. block_all_rule = FirewallRule( action=FirewallRule.ACTION_DROP, display_name="Drop all", ip_protocol=FirewallRule.IP_PROTOCOL_IPV4_IPV6) # Add all rules to a new firewall section and create the section. rule_list = FirewallSectionRuleList( rules=[ms_sql_rule, icmp_rule, block_all_rule], section_type=FirewallSection.SECTION_TYPE_LAYER3, stateful=True, display_name="MSSQL Server", description="Only allow MSSQL server traffic") demo_section = api_client.firewall.Sections.createwithrules( rule_list, None, operation="insert_top") # Re-read the firewall section so that we are operating on up-to-date # data. section = api_client.firewall.Sections.get(demo_section.id) # Make the firewall section apply to the db tier logical # switch. This enables the firewall policy on all logical # ports attached to the db tier logical switch. section.applied_tos = [ ResourceReference(target_id=db_ls.id, target_type="LogicalSwitch") ] api_client.firewall.Sections.update(section.id, section) print("At this point you may attach VMs for the db tier to the db") print("logical switch and VMs for the web tier to the web logical") print("switch. The network interfaces should be configured as") print("follows:") print("db tier:") print(" IP address: in the range 192.168.1.2-254") print(" Netmask: 255.255.255.0") print(" Default route: 192.168.1.1") print("web tier:") print(" IP address: in the range 192.168.2.2-254") print(" Netmask: 255.255.255.0") print(" Default route: 192.168.2.1") print("Logical switch IDs:") print(" %s: %s" % (db_ls.display_name, db_ls.id)) print(" %s: %s" % (web_ls.display_name, web_ls.id)) print("Transport zone: %s: %s" % (demo_tz.display_name, demo_tz.id)) print("Press enter to delete all resources created for this example.") sys.stdin.readline() api_client.firewall.Sections.delete(section.id, cascade=True) api_client.LogicalRouterPorts.delete(lr_port_for_web_tier.id) api_client.LogicalRouterPorts.delete(lr_port_for_db_tier.id) api_client.LogicalPorts.delete(web_port_on_ls.id) api_client.LogicalPorts.delete(db_port_on_ls.id) api_client.LogicalRouters.delete(lr.id) api_client.LogicalSwitches.delete(web_ls.id) api_client.LogicalSwitches.delete(db_ls.id) api_client.TransportZones.delete(demo_tz.id)