The sub-commands of
doctl compute firewall manage DigitalOcean cloud firewalls.
Cloud firewalls allow you to restrict network access to and from a Droplet by defining which ports accept inbound or outbound connections. With these commands, you can list, create, or delete Cloud firewalls, as well as modify access rules.
Note: Cloud firewalls are not internal Droplet firewalls on Droplets, such as UFW or FirewallD.
outbound_rules attributes contain arrays of objects as their values. These objects contain the standard attributes of their associated types, which can be found below.
Inbound access rules specify the protocol (TCP, UDP, or ICMP), ports, and sources for inbound traffic that will be allowed through the Firewall to the target Droplets. The
ports attribute may contain a single port, a range of ports (e.g.
all to allow traffic on all ports for the specified protocol. The
sources attribute will contain an object specifying a whitelist of sources from which traffic will be accepted.
|Help for this command
|Display commands that manage infrastructure
|doctl compute firewall add-droplets
|Add Droplets to a cloud firewall
|doctl compute firewall add-rules
|Add inbound or outbound rules to a cloud firewall
|doctl compute firewall add-tags
|Add tags to a cloud firewall
|doctl compute firewall create
|Create a new cloud firewall
|doctl compute firewall delete
|Permanently delete a cloud firewall
|doctl compute firewall get
|Retrieve information about a cloud firewall
|doctl compute firewall list
|List the cloud firewalls on your account
|doctl compute firewall list-by-droplet
|List firewalls by Droplet
|doctl compute firewall remove-droplets
|Remove Droplets from a cloud firewall
|doctl compute firewall remove-rules
|Remove inbound or outbound rules from a cloud firewall
|doctl compute firewall remove-tags
|Remove tags from a cloud firewall
|doctl compute firewall update
|Update a cloud firewall's configuration
|API V2 access token
|Override default API endpoint
Specify a custom config file
|Specify a custom authentication context name
Set maximum number of retries for requests that fail with a 429 or 500-level error
Set the minimum number of seconds to wait before retrying a failed request
Set the maximum number of seconds to wait before retrying a failed request
Enable interactive behavior. Defaults to true if the terminal supports it (default false)
Desired output format [text|json]
Show a log of network activity while performing a command
Enable verbose output