By looking at the iptables rules, there is no egress rules feature in your deployment. In your case the issue seems to be different.
Please do the below trouble shooting. Ping from the guest vm to public subnet/google and try to capture the packets on the router guest interface and public interface. Check wether the packets are reaching to public interface of VR or not. Also send iptables -L -nv output. Thanks, Jayapal On 22-May-2013, at 1:18 PM, wq meng <wqm...@gmail.com> wrote: > Hello Jayapal > > I know very little about api yet. > > I login to the VRouter VM, Can I change the rules to get work? > > On > https://cwiki.apache.org/confluence/display/CLOUDSTACK/Egress+firewall+rules+for+guest+network > > It says some Chains , but I can not find them inside my VRouter VM. > > ==================== > > firewallRule_egress.sh script get called on the virtual router. > > The egress rules are added in filter table table, FW_EGRESS_RULES chain. > > All the traffic from eth0 eth2 (public interface) will be send to the > FW_OUTBOUND chain. > > *iptables rules:* > > *Default rules:* > > ipassoc.sh adding rule to ACCEPT traffic from eth0 to public interface. > > Modified the rule to send egress traffic to the FW_OUTBOUND chain. > > *iptables -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND* > > *Rules added while configuring:* > > Ex: Egress rule to block the port 22 (ssh) traffic from 10.1.1.31/32 > > *iptables -A **FW_OUTBOUND **-j EGRESS_FWRULES* > > *iptables -A EGRESS_FWRULES -s 10.1.1.31/32 -p tcp --dport 22:22 -j > ACCEPT* > ====================== > > > > > > Here is how the current iptables shows. > > -------------------------------------------------------------------------------- > root@r-4-VM:~# iptables -L > Chain INPUT (policy DROP) > target prot opt source destination > NETWORK_STATS all -- anywhere anywhere > ACCEPT all -- anywhere vrrp.mcast.net > ACCEPT all -- anywhere 225.0.0.50 > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT icmp -- anywhere anywhere > ACCEPT all -- anywhere anywhere > ACCEPT udp -- anywhere anywhere udp dpt:bootps > ACCEPT udp -- anywhere anywhere udp dpt:domain > ACCEPT tcp -- anywhere anywhere state NEW tcp > dpt:3922 > ACCEPT tcp -- anywhere anywhere state NEW tcp > dpt:http-alt > ACCEPT tcp -- anywhere anywhere state NEW tcp > dpt:www > > Chain FORWARD (policy DROP) > target prot opt source destination > NETWORK_STATS all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere state NEW > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT all -- anywhere anywhere > > Chain OUTPUT (policy ACCEPT) > target prot opt source destination > NETWORK_STATS all -- anywhere anywhere > > Chain NETWORK_STATS (3 references) > target prot opt source destination > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > all -- anywhere anywhere > all -- anywhere anywhere > tcp -- anywhere anywhere > tcp -- anywhere anywhere > > > And the link have been fixed in the Git ? > > Thank you so much. > > > On Wed, May 22, 2013 at 2:55 PM, Jayapal Reddy Uradi < > jayapalreddy.ur...@citrix.com> wrote: > >> >> I think UI link is missed but it is fixed after that. >> Try to add rules using the API 'createEgressFirewallRule' >> >> Thanks, >> Jayapal >> >> On 22-May-2013, at 12:05 PM, wq meng <wqm...@gmail.com> >> wrote: >> >>> Hello Jayapal, >>> >>> >>> >> https://cwiki.apache.org/CLOUDSTACK/egress-firewall-rules-for-guest-network.html >>> >>> I have checked Network -> Guest Network (Name) -> >>> >>> I can not find out any Egress fire rule tab. >>> >>> >>> Have I missed something? >>> >>> >>> Thank you very much. >>> >>> >>> >>> >>> On Wed, May 22, 2013 at 1:23 PM, Jayapal Reddy Uradi < >>> jayapalreddy.ur...@citrix.com> wrote: >>> >>>> Hi, >>>> >>>> Did you configure the egress firewall rules on the guest network ? >>>> You need to add egress rules to allow guest traffic. >>>> >>>> After adding egress rule it not works, please send router iptables >> rules. >>>> >>>> Thanks, >>>> Jayapal >>>> >>>> On 22-May-2013, at 4:10 AM, wq meng <wqm...@gmail.com> wrote: >>>> >>>>> Hello >>>>> >>>>> Anyone have faced this problem? CS4.02 KVM Advanced Network, VM >> instance >>>>> can not access public IP. NAT(Source) >>>>> >>>>> >>>>> That the VM instance running, but inside the VM instance, it is not >>>>> possible to access outside. >>>>> >>>>> >>>>> It can ping VMs each other, It can ping google.com in the* Virtual >>>> Router >>>>> VM.* >>>>> >>>>> But just can not ping Google.com inside the VM instance. >>>>> >>>>> >>>>> Seems inside the VM instance, It can resolve the Google.com 's IP >>>> address. >>>>> BUT can not do others. >>>>> >>>>> Please see the following output. >>>>> >>>>> >>>>> ------------------------ >>>>> [root@CentOS5-5 ~]# wget www.google.com >>>>> --2013-05-21 08:30:39-- http://www.google.com/ >>>>> Resolving www.google.com... 173.194.64.104, 173.194.64.99, >>>> 173.194.64.105, >>>>> ... >>>>> Connecting to www.google.com|173.194.64.104|:80... >>>>> [root@CentOS5-5 ~]# ls >>>>> >>>>> ------------------------- >>>>> [root@CentOS5-5 ~]# iptables -L >>>>> Chain INPUT (policy ACCEPT) >>>>> target prot opt source destination >>>>> RH-Firewall-1-INPUT all -- anywhere anywhere >>>>> >>>>> Chain FORWARD (policy ACCEPT) >>>>> target prot opt source destination >>>>> RH-Firewall-1-INPUT all -- anywhere anywhere >>>>> >>>>> Chain OUTPUT (policy ACCEPT) >>>>> target prot opt source destination >>>>> >>>>> Chain RH-Firewall-1-INPUT (2 references) >>>>> target prot opt source destination >>>>> ACCEPT all -- anywhere anywhere >>>>> ACCEPT icmp -- anywhere anywhere icmp any >>>>> ACCEPT esp -- anywhere anywhere >>>>> ACCEPT ah -- anywhere anywhere >>>>> ACCEPT udp -- anywhere 224.0.0.251 udp >> dpt:mdns >>>>> ACCEPT udp -- anywhere anywhere udp >> dpt:ipp >>>>> ACCEPT tcp -- anywhere anywhere tcp >> dpt:ipp >>>>> ACCEPT all -- anywhere anywhere state >>>>> RELATED,ESTABLISHED >>>>> ACCEPT tcp -- anywhere anywhere state NEW >>>> tcp >>>>> dpt:ssh >>>>> REJECT all -- anywhere anywhere >> reject-with >>>>> icmp-host-prohibited >>>>> [root@CentOS5-5 ~]# ping 8.8.8.8 >>>>> PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. >>>>> >>>>> --- 8.8.8.8 ping statistics --- >>>>> 3 packets transmitted, 0 received, 100% packet loss, time 2000ms >>>>> >>>>> -------------------------- >>>>> [root@CentOS5-5 ~]# ifconfig >>>>> eth0 Link encap:Ethernet HWaddr 02:00:2D:C8:00:01 >>>>> inet addr:10.1.1.5 Bcast:10.1.1.255 Mask:255.255.255.0 >>>>> inet6 addr: fe80::2dff:fec8:1/64 Scope:Link >>>>> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 >>>>> RX packets:2442 errors:0 dropped:0 overruns:0 frame:0 >>>>> TX packets:2261 errors:0 dropped:0 overruns:0 carrier:0 >>>>> collisions:0 txqueuelen:1000 >>>>> RX bytes:174960 (170.8 KiB) TX bytes:154159 (150.5 KiB) >>>>> >>>>> lo Link encap:Local Loopback >>>>> inet addr:127.0.0.1 Mask:255.0.0.0 >>>>> inet6 addr: ::1/128 Scope:Host >>>>> UP LOOPBACK RUNNING MTU:16436 Metric:1 >>>>> RX packets:32 errors:0 dropped:0 overruns:0 frame:0 >>>>> TX packets:32 errors:0 dropped:0 overruns:0 carrier:0 >>>>> collisions:0 txqueuelen:0 >>>>> RX bytes:3913 (3.8 KiB) TX bytes:3913 (3.8 KiB) >>>>> >>>>> ---------------------------- >>>>> >>>>> [root@CentOS5-5 ~]# tracert www.google.com >>>>> traceroute to www.google.com (173.194.64.106), 30 hops max, 40 byte >>>> packets >>>>> 1 r-4-VM.cs2cloud.internal (10.1.1.1) 0.158 ms 0.136 ms 0.134 ms >>>>> 2 * * * >>>>> 3 * * * >>>>> 4 * * * >>>>> 5 * * * >>>>> 6 * * * >>>>> 7 * * * >>>>> 8 * * * >>>>> 9 * * * >>>>> 10 * * * >>>>> 11 * * * >>>>> 12 * * * >>>>> 13 * * * >>>>> 14 * * * >>>>> 15 * * * >>>>> 16 * * * >>>>> 17 * * * >>>>> 18 * * * >>>>> 19 * * * >>>>> 20 * * * >>>>> 21 * * * >>>>> 22 * * * >>>>> 23 * * * >>>>> 24 * * * >>>>> 25 * * * >>>>> 26 * * * >>>>> 27 * * * >>>>> 28 * * * >>>>> 29 * * * >>>>> 30 * * * >>>>> >>>>> ---------------- >>>>> >>>>> >>>>> Any thoughts? >>>>> >>>>> >>>>> >>>>> >>>>> Thank you very much. >>>> >>>> >> >>