>>Following rule on your pve nodes should prevent igmp packages flooding
>>your bridge:
>>iptables -t filter -A FORWARD -i vmbr0 -p igmp -j DROP
>>
>>If something happens you can remove the rule this way:
>>iptables -t filter -D FORWARD -i vmbr0 -p igmp -j DROP

Just be carefull that it'll block all igmp, so if you need multicast inside 
your vms,
I'll block it too.

Currently, we have a default rule for IN|OUT for host communication

-A PVEFW-HOST-IN -s yournetwork/24 -p udp -m addrtype --dst-type MULTICAST -m 
udp --dport 5404:5405 -j RETURN
to open multicast between nodes.

Bit indeed, currently, in proxmox firewall, we can't define global rule in 
FORWARD.




@Dietmar: maybe can we add a default drop rule in -A PVEFW-FORWARD, to drop 
multicast traffic from host ?

Or maybe better, allow to create rules at datacenter level, and put them in -A 
PVEFW-FORWARD  ?



----- Mail original -----
De: "datanom.net" <m...@datanom.net>
À: "pve-devel" <pve-devel@pve.proxmox.com>
Envoyé: Dimanche 4 Janvier 2015 03:34:57
Objet: Re: [pve-devel] Quorum problems with NICs Intel of 10 Gb/s and VMsturns 
off

On Sat, 3 Jan 2015 21:32:54 -0300 
"Cesar Peschiera" <br...@click.com.py> wrote: 

> 
> Now in the switch i have igmp snooping disabled, but i want to avoid 
> flooding the entire VLAN and the VMs 
> 
Following rule on your pve nodes should prevent igmp packages flooding 
your bridge: 
iptables -t filter -A FORWARD -i vmbr0 -p igmp -j DROP 

If something happens you can remove the rule this way: 
iptables -t filter -D FORWARD -i vmbr0 -p igmp -j DROP 

PS. Your SPF for click.com.py is configured wrong: 
Received-SPF: softfail (click.com.py ... _spf.copaco.com.py: Sender is 
not authorized by default to use 'br...@click.com.py' in 'mfrom' 
identity, however domain is not currently prepared for false failures 
(mechanism '~all' matched)) receiver=mail1.copaco.com.py; 
identity=mailfrom; envelope-from="br...@click.com.py"; helo=gerencia; 
client-ip=190.23.61.163 
Received-SPF: softfail (click.com.py ... _spf.copaco.com.py: Sender is 
not authorized by default to use 'br...@click.com.py' in 'mfrom' 
identity, however domain is not currently prepared for false failures 
(mechanism '~all' matched)) receiver=mail1.copaco.com.py; 
identity=mailfrom; envelope-from="br...@click.com.py"; helo=gerencia; 
client-ip=190.23.61.163 
Received-SPF: softfail (click.com.py ... _spf.copaco.com.py: Sender is 
not authorized by default to use 'br...@click.com.py' in 'mfrom' 
identity, however domain is not currently prepared for false failures 
(mechanism '~all' matched)) receiver=mail1.copaco.com.py; 
identity=mailfrom; envelope-from="br...@click.com.py"; helo=gerencia; 
client-ip=190.23.61.163 
-- 
Hilsen/Regards 
Michael Rasmussen 

Get my public GnuPG keys: 
michael <at> rasmussen <dot> cc 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xD3C9A00E 
mir <at> datanom <dot> net 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE501F51C 
mir <at> miras <dot> org 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE3E80917 
-------------------------------------------------------------- 
/usr/games/fortune -es says: 
Why does a hearse horse snicker, hauling a lawyer away? 
-- Carl Sandburg 

_______________________________________________ 
pve-devel mailing list 
pve-devel@pve.proxmox.com 
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel 
_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to