system services firewall policy create
(DEPRECATED)-Create a firewall policy entry for a network service
Availability: This command is available to cluster administrators at the admin privilege level.
Description
Note
This command is deprecated and may be removed in a future ONTAP release. Use network interface service-policy create or network interface service-policy add-service instead.  
You can use the network interface modify command with the -firewall-policy parameter to put a firewall policy into effect for a given logical interface by modifying that logical interface to use the specified firewall policy.
Parameters
- -vserver <vserver> - Vserver Name
 - Use this parameter to specify the name of the Vserver on which the policy is to be created.
 - -policy <textpolicy_name> - Policy
 - Use this parameter to specify the name of the policy that is to be created.
 - -service <service> - Service
 - Use this parameter to specify the network service that is associated with the policy. Possible values include:
- dns - The DNS protocol server
 - http - The HTTP protocol
 - ndmp - The NDMP tape backup protocol
 - ndmps - The NDMPS tape backup protocol
 - none - No protocol (for creating an empty policy)
 - ntp - The NTP protocol
 - rsh - The RSH protocol
 - snmp - The SNMP protocol
 - telnet - The Telnet protocol
 
 - -allow-list <IP Address/Mask>, ... - Allowed IPs
 - Use this parameter to specify one or more IP addresses with corresponding netmasks that are to be allowed by this firewall policy. The correct format for this parameter is address/netmask, similar to "192.0.2.128/25". Multiple address/netmask pairs should be separated with commas. Use the value 0.0.0.0/0 for "any".
 
Examples
The following example creates a firewall policy named data that uses the NDMP protocol and enables access from all IP addresses on the 192.0.2.128/25 subnet:
cluster1::> system services firewall policy create -policy data -service ndmp -allow-list 192.0.2.128/25
The following example adds an entry to the firewall policy named data, associating the DNS protocol with that policy and enabling access from all IP addresses on the 192.0.2.128/25 subnet:
cluster1::> system services firewall policy create -policy data -service dns -allow-list 192.0.2.128/25
Give documentation feedback