Thanks Anthony for the quick response, that appears to have worked perfectly. 
Looking forward to the 4.1 release now!

Just to note I had to remove the ebtables package without pulling dependencies 
otherwise libvirt and cloud-agent would have been removed too. 

rpm -e --nodeps ebtables


On 5 Feb 2013, at 17:44, Anthony Xu <xuefei...@citrix.com> wrote:

> Hi Nick,
> 
> This issue was fixed in 4.1
> 
> Try below workaround for 4.0.0.
> - stop cloud Agent service on KVM host
> - execute iptables -F, ebtables -F on KVM host
> - uninstall ebtables package on KVM host
> - start cloud Agent service on KVM host
> 
> 
> After uninstall ebtables package, CS thinks this KVM host cannot support SG, 
> and will not program Security group for this host.
> 
> 
> --Anthony
> 
> 
>> -----Original Message-----
>> From: Nick Wales [mailto:n...@nickwales.co.uk]
>> Sent: Tuesday, February 05, 2013 3:18 PM
>> To: cloudstack-users@incubator.apache.org
>> Subject: Problematic firewall rules for basic zone with no security
>> groups
>> 
>> I am running CS 4.0.0 running KVM. I have a basic zone with a network
>> offering providing DHCP and USERDATA only.
>> 
>> When I create a new instance I get the following iptables rules:
>> 
>> Chain i-2-18-VM (1 references)
>> target     prot opt source               destination
>> DROP       all  --  anywhere             anywhere
>> 
>> Chain i-2-18-VM-eg (1 references)
>> target     prot opt source               destination
>> 
>> Chain i-2-18-def (2 references)
>> target     prot opt source               destination
>> ACCEPT     all  --  anywhere             anywhere            state
>> RELATED,ESTABLISHED
>> ACCEPT     udp  --  anywhere             anywhere            PHYSDEV
>> match --physdev-in vnet13 --physdev-is-bridged udp spt:bootpc
>> dpt:bootps
>> ACCEPT     udp  --  anywhere             anywhere            PHYSDEV
>> match --physdev-out vnet13 --physdev-is-bridged udp spt:bootps
>> dpt:bootpc
>> RETURN     udp  --  10.28.175.130        anywhere            PHYSDEV
>> match --physdev-in vnet13 --physdev-is-bridged udp dpt:domain
>> i-2-18-VM-eg  all  --  10.28.175.130        anywhere            PHYSDEV
>> match --physdev-in vnet13 --physdev-is-bridged
>> i-2-18-VM  all  --  anywhere             anywhere            PHYSDEV
>> match --physdev-out vnet13 --physdev-is-bridged
>> 
>> I can't ping or ssh to the guest until I remove the DROP line. I
>> obviously want to avoid this step every time I spin up a new instance
>> and I can't add rules to the default security group as I don't have one.
>> I want completely unrestricted access to these guests from first boot
>> and I was under the impression not having security groups would provide
>> this. Please confirm if this is the case!
>> 
>> I have also changed and changed back the global setting:
>> "network.securitygroups.defaultadding"  to false but that had seemingly
>> no impact.
>> 
>> 
>> In other news I also got the following rules added initially, which
>> stop things like console services from working. "public" is the bridge
>> name so I presume that is
>> 
>> Chain FORWARD (policy ACCEPT)
>> target     prot opt source               destination
>> BF-public  all  --  anywhere             anywhere            PHYSDEV
>> match --physdev-is-bridged
>> BF-public  all  --  anywhere             anywhere            PHYSDEV
>> match --physdev-is-bridged
>> DROP       all  --  anywhere             anywhere
>> DROP       all  --  anywhere             anywhere
>> 
>> If I comment out the following in the configuration file then
>> everything works.
>> -a FORWARD -o public -j DROP
>> -a FORWARD -i public -j DROP
>> 
>> I'd like to remove this manual step if at all possible though.
>> 
>> Any help much appreciated.

Reply via email to