I have a testing cloudstack cluster, I destroyed it and rebuilding upgraded
serveral times, each time I ran into the same problem, unable to access
outside world from instances behind virtual router.

here is iptables before upgrade, Cloudstack 4.2

# Generated by iptables-save v1.4.14 on Fri Apr 11 19:53:57 2014
*mangle
:PREROUTING ACCEPT [2317:1282555]
:INPUT ACCEPT [409:147015]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [189:29312]
:POSTROUTING ACCEPT [189:29312]
:FIREWALL_176.23.23.192 - [0:0]
:VPN_176.23.23.192 - [0:0]
-A PREROUTING -d 176.23.23.192/32 -j VPN_176.23.23.192
-A PREROUTING -d 176.23.23.192/32 -j FIREWALL_176.23.23.192
-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK
--restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
-A POSTROUTING -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill
-A FIREWALL_176.23.23.192 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FIREWALL_176.23.23.192 -j DROP
-A VPN_176.23.23.192 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A VPN_176.23.23.192 -j RETURN
COMMIT
# Completed on Fri Apr 11 19:53:57 2014
# Generated by iptables-save v1.4.14 on Fri Apr 11 19:53:57 2014
*filter
:INPUT DROP [204:117504]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [150:22404]
:FW_OUTBOUND - [0:0]
:NETWORK_STATS - [0:0]
-A INPUT -j NETWORK_STATS
-A INPUT -d 224.0.0.18/32 -j ACCEPT
-A INPUT -d 225.0.0.50/32 -j ACCEPT
-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -i eth1 -p tcp -m state --state NEW -m tcp --dport 3922 -j ACCEPT
-A INPUT -i eth0 -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-A INPUT -s 10.1.1.0/24 -i eth0 -p tcp -m state --state NEW -m tcp --dport
8080 -j ACCEPT
-A FORWARD -j NETWORK_STATS
-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
-A OUTPUT -j NETWORK_STATS
-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
-A NETWORK_STATS -i eth0 -o eth2
-A NETWORK_STATS -i eth2 -o eth0
-A NETWORK_STATS ! -i eth0 -o eth2 -p tcp
-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
COMMIT
# Completed on Fri Apr 11 19:53:57 2014
# Generated by iptables-save v1.4.14 on Fri Apr 11 19:53:57 2014
*nat
:PREROUTING ACCEPT [2078:1204416]
:INPUT ACCEPT [10:964]
:OUTPUT ACCEPT [1:338]
:POSTROUTING ACCEPT [1:338]
-A POSTROUTING -o eth2 -j SNAT --to-source 176.23.23.192
COMMIT
# Completed on Fri Apr 11 19:53:57 2014


after upgrading to Cloudstack 4.3


:POSTROUTING ACCEPT [211:25828]
:FIREWALL_176.23.23.192 - [0:0]
:VPN_176.23.23.192 - [0:0]
-A PREROUTING -d 176.23.23.192/32 -j VPN_176.23.23.192
-A PREROUTING -d 176.23.23.192/32 -j FIREWALL_176.23.23.192
-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK
--restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
-A POSTROUTING -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill
-A FIREWALL_176.23.23.192 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FIREWALL_176.23.23.192 -j DROP
-A VPN_176.23.23.192 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A VPN_176.23.23.192 -j RETURN
COMMIT
# Completed on Fri Apr 11 20:49:46 2014
# Generated by iptables-save v1.4.14 on Fri Apr 11 20:49:46 2014
*filter
:INPUT DROP [68:32168]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [81:12516]
:FW_EGRESS_RULES - [0:0]
:FW_OUTBOUND - [0:0]
:NETWORK_STATS - [0:0]
-A INPUT -j NETWORK_STATS
-A INPUT -d 224.0.0.18/32 -j ACCEPT
-A INPUT -d 225.0.0.50/32 -j ACCEPT
-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -i eth1 -p tcp -m state --state NEW -m tcp --dport 3922 -j ACCEPT
-A INPUT -i eth0 -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-j ACCEPT
-A FORWARD -j NETWORK_STATS
-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
-A FORWARD -i eth3 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -o eth3 -j FW_OUTBOUND
-A OUTPUT -j NETWORK_STATS
-A FW_EGRESS_RULES -p udp -m udp --dport 1:65535 -j ACCEPT
-A FW_EGRESS_RULES -p icmp -m icmp --icmp-type 8/0 -j ACCEPT
-A FW_EGRESS_RULES -p tcp -m tcp --dport 1:65535 -j ACCEPT
-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FW_OUTBOUND -j FW_EGRESS_RULES
-A NETWORK_STATS -i eth0 -o eth2
-A NETWORK_STATS -i eth2 -o eth0
-A NETWORK_STATS ! -i eth0 -o eth2 -p tcp
-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
-A NETWORK_STATS -i eth0 -o eth3
-A NETWORK_STATS -i eth3 -o eth0
-A NETWORK_STATS ! -i eth0 -o eth3 -p tcp
-A NETWORK_STATS -i eth3 ! -o eth0 -p tcp
COMMIT
# Completed on Fri Apr 11 20:49:46 2014
# Generated by iptables-save v1.4.14 on Fri Apr 11 20:49:46 2014
*nat
:PREROUTING ACCEPT [685:441108]
:INPUT ACCEPT [7:492]
:OUTPUT ACCEPT [2:136]
:POSTROUTING ACCEPT [3:412]
-A POSTROUTING -o eth3 -j SNAT --to-source 199.96.39.192
COMMIT
# Completed on Fri Apr 11 20:49:46 2014


Please help!! is a KVM cluster, I have two bridges, cloudbr0 and cloudbr1.
bridge cloudbr0 is default public/guest and cloudbr1 is management.

I am able to ping from virtual router, I personally think source NAT is the
issue,

Thanks,


On Fri, Apr 11, 2014 at 8:14 AM, motty cruz <motty.c...@gmail.com> wrote:

> looking at the VR it has three interfaces NIC1 10.1.1.1 NIC2 (type
> control) Local Link NIC3(default NIC) public IP
>
> when I log in to the router and ran the following command:
> ifconfig -a
> I see 4 interfaces eth0 10.1.1.1 eth1 (local link)169.254.3.81 eth2 public
> IP eth3 (same public IP as eth2).
>
> I believe this is my problem, but don't know how to fix it,
> any ideas?
>
>
> On Fri, Apr 11, 2014 at 8:04 AM, motty cruz <motty.c...@gmail.com> wrote:
>
>> Thanks Suresh,
>>
>> I tried your suggestion and I'm not able to access outside the VR router.
>> I am stumped!
>>
>> please help!
>>
>>
>>
>>
>> On Thu, Apr 10, 2014 at 7:21 AM, Suresh Sadhu <suresh.sa...@citrix.com>wrote:
>>
>>> Ok  then work around is manually append rule to cloudbr1 .
>>>
>>> Take the backup of iptables rules
>>> Manfully detach the eth interface from  cloudbr0  and attach to cloudbr1
>>> Apply the all exiting  firewall  rules manually on the interface gain
>>>
>>>
>>> After that your VMs will access the public network.
>>>
>>>
>>> Regards
>>> Sadhu
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: motty cruz [mailto:motty.c...@gmail.com]
>>> Sent: 10 April 2014 19:40
>>> To: users@cloudstack.apache.org
>>> Subject: Re: Cloudstack 4.3 instances can't access outside world
>>>
>>> yes, I'm am using traffic labels, everything was working fine before the
>>> upgrade to 4.3. did not change anything on the cloudbr0 or cloudbr1.
>>>
>>>
>>> On Thu, Apr 10, 2014 at 7:05 AM, Suresh Sadhu <suresh.sa...@citrix.com
>>> >wrote:
>>>
>>> > Did you used traffic name labels?
>>> >
>>> > In 4.3 traffic labels are not considering ,by default its attaching to
>>> > default  traffic labels(eg:in KVM its cloudbr0 ...due to this unable
>>> > to access public network i.r before upgrade if ieth2 attached cloudbr1
>>> > and after upgrade its attached to cloudbr0).maybe you are hitting this
>>> issue.
>>> >
>>> > Regards
>>> > sadhu
>>> >
>>> >
>>> > -----Original Message-----
>>> > From: motty cruz [mailto:motty.c...@gmail.com]
>>> > Sent: 10 April 2014 19:28
>>> > To: users@cloudstack.apache.org
>>> > Subject: Re: Cloudstack 4.3 instances can't access outside world
>>> >
>>> > yes I can ping VR, also after the upgrade VR has four insterfaces,
>>> > eth0 subnet for Instances, eth1, eth2 for public IP and eth3 for
>>> public IP.
>>> >
>>> >
>>> > On Wed, Apr 9, 2014 at 10:35 PM, Erik Weber <terbol...@gmail.com>
>>> wrote:
>>> >
>>> > > Can you ping the VR? Log on to the VR, and get the iptables rules.
>>> > > How do they look?
>>> > >
>>> > > Erik Weber
>>> > > 10. apr. 2014 00:21 skrev "motty cruz" <motty.c...@gmail.com>
>>> følgende:
>>> > >
>>> > > > I did add egress rules, reboot network but no sucess, so I removed
>>> > > > that rules and nothing.
>>> > > >
>>> > > > I am lost.
>>> > > >
>>> > > >
>>> > > > On Wed, Apr 9, 2014 at 9:08 AM, Erik Weber <terbol...@gmail.com>
>>> > wrote:
>>> > > >
>>> > > > > Did you remove the egress rule again? If not, try that.
>>> > > > >
>>> > > > > Erik
>>> > > > > 9. apr. 2014 15:49 skrev "motty cruz" <motty.c...@gmail.com>
>>> > følgende:
>>> > > > >
>>> > > > > > yes I try adding the rule, restart network and router but no
>>> > success!
>>> > > > > >
>>> > > > > >
>>> > > > > > On Tue, Apr 8, 2014 at 11:16 PM, Erik Weber
>>> > > > > > <terbol...@gmail.com>
>>> > > > wrote:
>>> > > > > >
>>> > > > > > > Try adding an egress rule, and removing it again.
>>> > > > > > >
>>> > > > > > > We experience the same, but has so far believed it was
>>> > > > > > > because we
>>> > > > > changed
>>> > > > > > > the default rule from deny to allow after accounts were
>>> made..
>>> > > > > > >
>>> > > > > > >
>>> > > > > > > On Tue, Apr 8, 2014 at 11:14 PM, motty cruz
>>> > > > > > > <motty.c...@gmail.com>
>>> > > > > > wrote:
>>> > > > > > >
>>> > > > > > > > I have two isolated network both virtual routers can ping
>>> > > anywhere,
>>> > > > > but
>>> > > > > > > the
>>> > > > > > > > Instances behind the virtual router can't ping or access
>>> > > > > > > > the
>>> > > > > internet.
>>> > > > > > > >
>>> > > > > > > >
>>> > > > > > > >
>>> > > > > > > >
>>> > > > > > > > On Tue, Apr 8, 2014 at 10:38 AM, motty cruz <
>>> > > motty.c...@gmail.com>
>>> > > > > > > wrote:
>>> > > > > > > >
>>> > > > > > > > > Hello,
>>> > > > > > > > > I'm having issues with VMs unable to access outside
>>> world.
>>> > > > > > > > > I
>>> > > can
>>> > > > > ping
>>> > > > > > > > > gateway, also when I log in to virtual router, I am able
>>> > > > > > > > > to
>>> > > ping
>>> > > > > > > > > google.com or anywhere.
>>> > > > > > > > > in the Egress rules I am allowing all. reboot network
>>> > > > > > > > > and
>>> > > virtual
>>> > > > > > > router
>>> > > > > > > > > does not help.
>>> > > > > > > > >
>>> > > > > > > > > VMs were able to access outside before upgrading from
>>> > > > > > > > > 4.2 to
>>> > > 4.3.
>>> > > > > > > > >
>>> > > > > > > > > any ideas?
>>> > > > > > > > >
>>> > > > > > > >
>>> > > > > > >
>>> > > > > >
>>> > > > >
>>> > > >
>>> > >
>>> >
>>>
>>
>>
>

Reply via email to