This just means you installed it in the wrong way. Ebtables and Iptables
must be filled with rules like

-A i-6242-10304-def -m state --state RELATED,ESTABLISHED -j ACCEPT
-A i-6242-10304-def -p udp -m physdev --physdev-in vnet18
--physdev-is-bridged -m udp --sport 68 --dport 67 -j ACCEPT
-A i-6242-10304-def -p udp -m physdev --physdev-out vnet18
--physdev-is-bridged -m udp --sport 67 --dport 68 -j ACCEPT
-A i-6242-10304-def -m physdev --physdev-in vnet18 --physdev-is-bridged -m
set ! --match-set i-6242-10304-vm src -j DROP
-A i-6242-10304-def -p udp -m physdev --physdev-in vnet18
--physdev-is-bridged -m set --match-set i-6242-10304-vm src -m udp --dport
53 -j RETURN
-A i-6242-10304-def -p tcp -m physdev --physdev-in vnet18
--physdev-is-bridged -m set --match-set i-6242-10304-vm src -m tcp --dport
53 -j RETURN
-A i-6242-10304-def -m physdev --physdev-in vnet18 --physdev-is-bridged -m
set --match-set i-6242-10304-vm src -j i-6242-10304-vm-eg
-A i-6242-10304-def -m physdev --physdev-out vnet18 --physdev-is-bridged -j
i-6242-10304-vm
-A i-6242-10304-vm -p udp -m udp --dport 1:65535 -m state --state NEW -j
ACCEPT
-A i-6242-10304-vm -p tcp -m tcp --dport 1:65535 -m state --state NEW -j
ACCEPT
-A i-6242-10304-vm -p icmp -m icmp --icmp-type any -j ACCEPT
-A i-6242-10304-vm -j DROP


Bridge chain: i-4435-8929-vm-in, entries: 7, policy: ACCEPT
-s ! 1e:0:32:0:2:2 -j DROP
-p ARP -s ! 1e:0:32:0:2:2 -j DROP
-p ARP --arp-mac-src ! 1e:0:32:0:2:2 -j DROP
-p ARP -j i-4435-8929-vm-in-ips
-p ARP --arp-op Request -j ACCEPT
-p ARP --arp-op Reply -j ACCEPT
-p ARP -j DROP



On Mon, Sep 28, 2020 at 1:10 PM Hean Seng <heans...@gmail.com> wrote:

> I checked the hypervisor , it seems iptables is nothing inside ,  this is
> centos7 ,  initially i turnoff firewalld ,  but even i turn on it now and
> try to update the security group rules, it seems empty iptable rules :
>
> [root@kvm03 ~]# iptables -L -v -n
>
> Chain INPUT (policy ACCEPT 82903 packets, 1170M bytes)
>
>  pkts bytes target     prot opt in     out     source
> destination
>
>
> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>
>  pkts bytes target     prot opt in     out     source
> destination
>
>
> Chain OUTPUT (policy ACCEPT 80505 packets, 25M bytes)
>
>  pkts bytes target     prot opt in     out     source
> destination
>
>
>
>
>
>
>
> On Mon, Sep 28, 2020 at 12:05 PM Pearl d'Silva <pearl.dsi...@shapeblue.com
> >
> wrote:
>
> > Hi Hean,
> >
> > In an Advanced Zone with Security Groups enabled, by default, egress
> > traffic from the VM is allowed, while Ingress traffic is denied. Hence,
> as
> > you rightly mentioned, security group rules are added accordingly. These
> > rules get added on the hypervisor host, and you can verify them, by going
> > into the host and searching for iptables rules corresponding to the VM
> > (internal name - i-x-y-VM).
> > This blog maybe helpful in providing further details:
> >
> >
> https://shankerbalan.net/blog/cloudstack-advanced-zone-with-security-groups/
> >
> > Thanks,
> > Pearl
> > ________________________________
> > From: Hean Seng <heans...@gmail.com>
> > Sent: Sunday, September 27, 2020 2:48 PM
> > To: users@cloudstack.apache.org <users@cloudstack.apache.org>
> > Subject: Cloudstack Advance with Security Group
> >
> > Hi
> >
> > I created advance zone with security group, all working fine.
> >
> > But VMcreated , seems the default security group that assigned to the VM.
> > all accept policy , i understand  is Default Deny, and once add in the
> port
> > in Security Group Ingress and Egress, only is allowed
> >
> > Also, is this rules created at VirtualRouter of the SharedNetwork, or at
> > the Hypervisor?
> >
> >
> >
> > --
> > Regards,
> > Hean Seng
> >
> > pearl.dsi...@shapeblue.com
> > www.shapeblue.com
> > 3 London Bridge Street,  3rd floor, News Building, London  SE1 9SGUK
> > @shapeblue
> >
> >
> >
> >
>
> --
> Regards,
> Hean Seng
>

Reply via email to