Please find my comments inline. Thanks, Jayapal
> -----Original Message----- > From: Sangeetha Hariharan [mailto:sangeetha.hariha...@citrix.com] > Sent: Wednesday, October 17, 2012 2:17 AM > To: cloudstack-dev@incubator.apache.org; Alena Prokharchyk > Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on the > SRX > > Hi Jayapal, > > Had the following questions after reviewing the FS. > > > 1) "Case 4: > Firewall rule is not deleted when disable the Static NAT. > 1. Acquire Ip P4. > 2. Create Firewall for port 22. > 3. Enable static NAT on P2 for VM2. > 4. Disable static NAT. > 5. Enable static NAT > 7.PublicNetwork# ssh <P4> (ssh to VM1 should success)" > > In this case, step 3 , i assume should be P4. Yes, It is P4 > > After Step4 , In the SRX side , we will see both the firewall rule and static > NAT > being deleted. But in cloud DB we will still have the firewall rules present. > Is > this correct? > Correct > After Step5 , In the SRX side , we will see both the firewall rule and static > NAT > being created back in SRX side. Is this correct? > Correct > 2) What will the behavior in the following use case where user deletes a > firewall that was created for a Static NAT rule ? Firewall and static nat both created in SRX. > > 1. Acquire Ip address. > 2. Create an Static NAT rule. > 3. Create Firewall rules for port 22. > 4. Create Firewall rule for port 80. > 5. Delete firewall rule for port 22. > 6. Delete firewall rule for port 80. > 7. Add firewall rule for port 22. > > After Step 5 , > In SRX , we expect the firewall rule for port 22 to be deleted. > > After Step 6 , > > In SRX , Do we expect the firewall rule for port 80 and Static NAT rule to be > deleted ? Yes > > After Step 7 , > > In SRX , Do we expect the firewall rule for port 22 and Static NAT rule to be > created ? Yes > > -Thanks > Sangeetha > > -----Original Message----- > From: Jayapal Reddy Uradi [mailto:jayapalreddy.ur...@citrix.com] > Sent: Tuesday, October 16, 2012 7:43 AM > To: cloudstack-dev@incubator.apache.org; Alena Prokharchyk > Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on the > SRX > > Updated the FS as per the discussion. > > https://cwiki.apache.org/confluence/display/CLOUDSTACK/Static+NAT,+Por > t+Forwarding+and+Firewall+Implementation+on+SRX > > > Thanks, > Jayapal > > > -----Original Message----- > > From: Jayapal Reddy Uradi [mailto:jayapalreddy.ur...@citrix.com] > > Sent: Tuesday, October 16, 2012 12:44 PM > > To: Alena Prokharchyk; cloudstack-dev@incubator.apache.org > > Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on > > the SRX > > > > Please see my comments inline. > > > > -Jayapal > > > > From: Alena Prokharchyk > > Sent: Monday, October 15, 2012 10:04 PM > > To: Jayapal Reddy Uradi; cloudstack-dev@incubator.apache.org > > Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on > > the SRX > > > > > > > > From: Jayapal Reddy Uradi > > <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> > > To: Alena Prokharchyk > > <alena.prokharc...@citrix.com<mailto:alena.prokharc...@citrix.com>>, > > "cloudstack-dev@incubator.apache.org<mailto:cloudstack- > > d...@incubator.apache.org>" <cloudstack- > > d...@incubator.apache.org<mailto:cloudstack- > d...@incubator.apache.org>> > > Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on > > the SRX > > > > Hi Alena, > > > > Please see my comments inline, > > > > -Jayapal > > > > -----Original Message----- > > From: Alena Prokharchyk > > Sent: Friday, October 12, 2012 10:19 PM > > To: Jayapal Reddy Uradi; cloudstack- > > d...@incubator.apache.org<mailto:cloudstack-dev@incubator.apache.org> > > Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on > > the SRX Jayapal, please see my comments inline. > > -Alena. > > On 10/11/12 11:07 PM, "Jayapal Reddy Uradi" > > <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> > > wrote: > > >Alena, > > > > > >Please find my inline comments. > > > > > >Thanks, > > >Jayapal > > > > > >Thanks, > > >Jayapal > > > > > >-----Original Message----- > > >From: Alena Prokharchyk > > >Sent: Friday, October 12, 2012 5:54 AM > > >To: > > >cloudstack-dev@incubator.apache.org<mailto:cloudstack- > > d...@incubator.apa > > >che.org>; Jayapal Reddy Uradi > > >Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on > > >the SRX > > > > > >Jayapal, I reviewed the spec. My comments: > > > > > >If firewall rules per public IP address can't be configured on the > > >SRX, and there is no way to fix it (your spec says so in "Limitation" > > >section), why do we introduce all this complexity? To me it seems > > >like we are trying to show the user that he is controlling public > > >ports on SRX, while in fact it's not true. It should work just like > > >it used to work > > >before: the Ingress traffic flow from public to guest interfaces > > >should be controlled by PF/StaticNat/LB rule; Ingress traffic to > > >public ip address is allowed always. When there is no PF/LB/StaticNat > > >rule for the Guest network port, the traffic to Guest port is > > >blocked. Once you create PF rule for publicIp > > >+ guestIp, the access to the specific port of the Guest network is > > >+ opened > > >automatically. The example below (taken from the spec): > > > > > >Example: > > > > > >1. Acquire IP P1. > > >2. Create Firewall for port 22 - port 22. > > >3. Configure the port forwarding for Public IP P1, user VM V1 4. > > >Acquire another IP P2. > > >5. Enable staticNAT on P2 for VM V1 > > > > > >//Jayapal > > >Let me change the case here and going to update in FS. > > >6.Add firewall rule for P2 for VM V1 on ports 80 7. Now In SRX, using > > >P2 user can access the VM V1 ports 22 and 80. > > Still doesn't work like the regular Firewall rule. You enabled > > Firewall for port > > 22 on P1, and for port 80 on P2 and it results in being able to access > > port 22/80 on P2? Firewall rule on one public IP should never affect > > the behavior of another public IP. That's not how Firewall rule is supposed > to work. > > > > > >7. Now P1 and P2 both can access the VM port 22 - /// you haven't > > >created the Firewall rule for the P2, yet the access from it is > > >enabled implicitly to 22:22 port. It's very confusing. In other > > >words, the firewall rule created for P1 ip should never ever control > > >the access to > > >P2 ip address. > > > > > > > > >We need to fix the original issue - make StaticNat rules on the SRX. > > >For that we have to treat firewall rule as a static nat rule for a > > >particular port by SRX device if the static nat is enabled for this > > >public ip address in the cloudStack. In all other cases Firewall rule > > >should be just ignored. > > > > > >//Jayapal > > >I agree with ignoring firewall for port forwarding. > > >But in VR the PF rule works only after adding Firewall rule for the > > >public ports. > > It is ok to leave it the old way for the SRX. Your limitation clearly > > says that you can't control the public IP / ports on the SRX anyway. > > So lets just fix the Static nat rule; it would also leave less chance > > for regressing in PF rules functionality. > > > > > >CASE1: > > > > > >* Get Ip1. > > >* Create PF rule for IP1 and port 22 VM1. Now you can access the Vm1. > > >* Create firewall rule for Ip1. SRX should just ignore this request > > >as it will not do anything > > > > > > > > >CASE2: > > > > > >* Get IP2 > > >* Enable static nat on the IP2 and VM1. Nothing is sent to SRX just yet. > > >* Create firewall rule for IP2 and ports 22-23. Send enable static > > >nat for > > >IP2/VM1 and port 22-23 to the SRX device > > >* Repeat last step for each port (port range) you want to enable > > >static nat for. > > > > > >//Jayapal > > >In SRX, below issue can still exist. > > >Case3: > > >In addition to CASE1, CASE2, Create another PF rule for IP1 and port > > >80 VM1. Now you can access the Vm1 port 80. > > >Now P2 can access the port 80 without Firewall rule on Port 80. > > >Because security policy in SRX is not differentiated for Public IPs. > > You can never create the PF or LB rule for the ip address that has > > Static nat rule assigned. > > [Jayapal] > > But we can create > > - PF: P1, VM V1 and ports 22-22 > > - Static NAT: P2 VM V1, and Firewall port 80 Here P2 can access V1's > > ports 22, 80. This is specific to SRX. > > > > If it was always the case for SRX, then we just have to document it. I > > believe even with the initial design you've proposed, it would have been > the case. > > You can't control public ports with Firewall rules. > > Please confirm. > > [Jayapal] > > This case is always with the SRX. > > > > > > > >In other words, you have to make the translation of Firewall rule of > > >the cloudStack to ConfigureStaticNat on SRX when the targeted public > > >IP address is Static nat enabled. In all other cases Firewall > > >commands should be just ignored by the SRX device. > > > > > > > > >Let me know what you think, > > >//Jayapal > > >I agree with you. > > >Current port forwarding rule have Public Port range and Private Port > > >range. > > >So port forwarding allows only the Public Ports that we added. Again > > >allowing Ports using Firewall is of no use. > > >Example: > > >Port forwarding rule: public Ports 22 and private ports 22 Here Port > > >Forwarding can allow only 22. so no need to explicitly add using > > >the firewall to allow If you donĀ¹t want to allow the ports DELETE the > > >Port Forwarding rule. > > >On top of PF adding Firewall rule to allow ports 22-80 of no use > > >because there is port forwarding rule for 23-80. > > It's allright. We can change the UI to disable Firewall rule block on > > the networking diagram (when the PF provider is SRX). So only PF/LB > > and Static nat functionality will be enabled. For opening ports for > > static nat the UI will still be using createFirewall rule calls, but > > it will not be shown to the user as "Firewall" > > > > > >-Alena. > > > > > > > > > > > > > > > > > >On 10/11/12 6:16 AM, "Jayapal Reddy Uradi" > > ><jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> > > >wrote: > > > > > >>StaticNAT, PortForwarding and Firewall current functionality in > > >>SRX is not similar to the Virtual router. > > >>This functional spec describes the what configuration possible on > > >>the SRX and also the limitation of SRX compared to the functionality in > VR. > > >> > > >>Please find the functional spec here: > > > >>https://cwiki.apache.org/confluence/display/CLOUDSTACK/Static+NAT,+P > > or > > >>t > > >>+Fo > > >>rwarding+and+Firewall+Implementation+on+SRX > > >> > > >>Please provide your comments on configuring the SRX device to get > > >>functionality similar to VR. > > >> > > >>Thanks, > > >>Jayapal > > >> > > >> > > > > > > > > > > >