GitHub user mwaag created a discussion: ACL-Rule Behaviour for TCP/UDP-Protocol 
without start- and endport

Hi,

we noticed cloudstack let you successfully define ACL-Ingress-Rules for TCP 
(and UDP) without setting a start- and endport. 
Many of our users (even we) assumed, that it stands for 'all ports'. But 
instead the router keeps on blocking traffic.
(We didn't test this on UDP explicitly)

We know, we can workaround this with just setting start- and endports or use 
protocol: All

Is this expected behaviour or should this be handled as a bug?
(We probably would suggest to either restrict defining rules without setting 
start- and endports at all or treat this kind of rules as "all ports" - rule)

Tested Versions are:
4.18.2.4
4.20.3.0

<img width="644" height="574" alt="10_03_08-000372" 
src="https://github.com/user-attachments/assets/8e30ee61-1e84-404f-a5e0-311bc401fba6";
 />
<img width="1597" height="550" alt="10_04_13-000374" 
src="https://github.com/user-attachments/assets/96abd943-63a7-4b72-a797-8d181f3da53b";
 />


GitHub link: https://github.com/apache/cloudstack/discussions/13113

----
This is an automatically sent email for [email protected].
To unsubscribe, please send an email to: [email protected]

Reply via email to