Hi,

The network acl feature is implemented through iptables and ipset. If you
have related knowledge and like to investigate the issue, it would be nice.

Wei

On Saturday, 2 October 2021, vas...@gmx.de <vas...@gmx.de> wrote:

> I can do. But before raising "issues" I normally try to confirm that my
> issue is to some degree valid. As my knowledge on how and where Cloudstack
> is working with the configured ACLs is at the moment quiet shallow, i will
> need to try out some things beforehand I guess....
>
> Wei ZHOU <ustcweiz...@gmail.com> schrieb am Sa., 2. Okt. 2021, 08:50:
>
> > Hi,
> >
> > Could you create an issue on github and provide more details ?
> >
> > -Wei
> >
> > On Sat, 2 Oct 2021 at 02:31, vas...@gmx.de <vas...@gmx.de> wrote:
> >
> > > Hi everyone,
> > >
> > > i currently am looking into the ACL implemention used in VPCs.
> > >
> > > However i was not able to locate any of my created "egress" - entries
> in
> > > any of the chains / tables  on the router.
> > > Tried several things like deny / allow egress traffic for one client or
> > the
> > > whole tier, but i wasn't able to locate the changes on the router.
> > >
> > > Might one of you can give some where to look / locate egress related
> > rules
> > > in iptables?
> > >
> > > In this context, maybe someone can give me an idea if my understanding
> of
> > > the documentation regarding egress ACL items is correct.
> > > From the docs:
> > > " ... once you add an ACL rule for outgoing traffic, then only outgoing
> > > traffic specified in this ACL rule is allowed, the rest is blocked."
> > > so adding an "eggress + allow" for an instance in the tier shall result
> > in
> > > changeing the "default"  of the whole acl to "egress + deny" for the
> rest
> > > of the network automatically.
> > > is that correct?
> > >
> > > Thanks in advance!
> > >
> >
>

Reply via email to