Marking this as invalid because, a solution to the problem exists - and
as such it is not a code bug.

** Changed in: neutron
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1417699

Title:
  Security Groups anti-spoofing rule blocks traffic on multi-nic VMs

Status in OpenStack Neutron (virtual network service):
  Invalid

Bug description:
  
  Scenario:
        MultiNic VM -----eth0 (192.168.100.44)
                                 -----eth1 (192.168.0.10)
                                 -----eth2 (192.168.20.10)

  Test:
      Ping 192.168.0.10 does not work
      Ping 192.168.100.44 works

  RootCause:
      default route on VM is pointing to eth0
      Ping requests arrive at VM on eth1, but the Ping responses go out of eth0
      Security AntiSpoofing rule drops this ping response, because, the IP 
address does not match

  Fix:
      Provide a configurable knob in Security Groups or PortSecurity Extension 
to disable just the anti-spoofing rules,
       but keep the other ingress/egress filters.
      We dont want to disable security-groups entirely on such VMs

  Notes:
      Workarounds include:  multiple default routes in the guest VM via linux 
route tables (works only on linux)

  Any other ideas for a fix or a workaround ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1417699/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to