rvalle opened a new issue #4402:
URL: https://github.com/apache/cloudstack/issues/4402
<!--
Verify first that your issue/request is not already reported on GitHub.
Also test if the latest release and master branch are affected too.
Always add information AFTER of these HTML comments, but no need to delete
the comments.
-->
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Report
##### COMPONENT NAME
<!--
Categorize the issue, e.g. API, VR, VPN, UI, etc.
-->
~~~
VPC
~~~
##### CLOUDSTACK VERSION
<!--
New line separated list of affected versions, commit ID for issues on master
branch.
-->
~~~
4.14
~~~
##### CONFIGURATION
<!--
Information about the configuration if relevant, e.g. basic network,
advanced networking, etc. N/A otherwise
-->
##### OS / ENVIRONMENT
<!--
Information about the environment if relevant, N/A otherwise
-->
Ubuntu 18.04, KVM, Advanced Networking, Local Storage
##### SUMMARY
<!-- Explain the problem/feature briefly -->
According to the documentation: "By default, all incoming traffic to the
guest networks is blocked and all outgoing traffic from guest networks is
allowed, once you add an ACL rule for outgoing traffic, then only outgoing
traffic specified in this ACL rule is allowed, the rest is blocked."
ACLs on VPC tiers do not block the rest of the traffic even if an Egress
rule is added.
##### STEPS TO REPRODUCE
<!--
For bugs, show exactly how to reproduce the problem, using a minimal
test-case. Use Screenshots if accurate.
For new features, show how the feature would be used.
-->
<!-- Paste example playbooks or commands between quotes below -->
~~~
- create a VPC with 2 tiers, Management and Service
- create a custom ACL for each tier with the same name as the tier
- Create an ACL Egress rule on Management that allows accessing Service Tier
(for example on port 22)
- Create a VM on Management Tier
- Test accessing the Service tier from the VM
- Test accessing the Internet from the VM
~~~
<!-- You can also paste gist.github.com links for larger files -->
##### EXPECTED RESULTS
<!-- What did you expect to happen when running the steps above? -->
~~~
The VM should have access to the Service tier as specified.
However, Since there is already an Egress rule specified the the rest of
outgoing traffic should be blocked.
The VM should not be able to access the Interenet.
~~~
##### ACTUAL RESULTS
<!-- What actually happened? -->
<!-- Paste verbatim command output between quotes below -->
~~~
The VM can access the internet:
ping www.google.com works
wget http://www.google.com works.
~~~
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
[email protected]