Hello Jayapal,
Thanks for the update, I will try that. And some more information for you. I have tried the API. createEgressFirewallRule But it shows "Unknown API command: listEgressFirewallRules" , Is it should be do not have the APIs, in 4.0.2.20130521045123 ? Very confused. <errorresponse cloud-stack-version="4.0.2.20130521045123"><errorcode>432</errorcode><cserrorcode>9999</cserrorcode><errortext>Unknown API command: createEgressFirewallRule</errortext></errorresponse> <errorresponse cloud-stack-version="4.0.2.20130521045123"><errorcode>432</errorcode><cserrorcode>9999</cserrorcode><errortext>Unknown API command: listEgressFirewallRules</errortext></errorresponse> Thank you so much. On Wed, May 22, 2013 at 4:14 PM, Jayapal Reddy Uradi < jayapalreddy.ur...@citrix.com> wrote: > By looking at the iptables rules, there is no egress rules feature in your > deployment. > In your case the issue seems to be different. > > Please do the below trouble shooting. > Ping from the guest vm to public subnet/google and try to capture the > packets on the router guest interface and public interface. > Check wether the packets are reaching to public interface of VR or not. > > Also send iptables -L -nv output. > > Thanks, > Jayapal > > On 22-May-2013, at 1:18 PM, wq meng <wqm...@gmail.com> > wrote: > > > Hello Jayapal > > > > I know very little about api yet. > > > > I login to the VRouter VM, Can I change the rules to get work? > > > > On > > > https://cwiki.apache.org/confluence/display/CLOUDSTACK/Egress+firewall+rules+for+guest+network > > > > It says some Chains , but I can not find them inside my VRouter VM. > > > > ==================== > > > > firewallRule_egress.sh script get called on the virtual router. > > > > The egress rules are added in filter table table, FW_EGRESS_RULES chain. > > > > All the traffic from eth0 eth2 (public interface) will be send to the > > FW_OUTBOUND chain. > > > > *iptables rules:* > > > > *Default rules:* > > > > ipassoc.sh adding rule to ACCEPT traffic from eth0 to public interface. > > > > Modified the rule to send egress traffic to the FW_OUTBOUND chain. > > > > *iptables -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND* > > > > *Rules added while configuring:* > > > > Ex: Egress rule to block the port 22 (ssh) traffic from 10.1.1.31/32 > > > > *iptables -A **FW_OUTBOUND **-j EGRESS_FWRULES* > > > > *iptables -A EGRESS_FWRULES -s 10.1.1.31/32 -p tcp --dport 22:22 > -j > > ACCEPT* > > ====================== > > > > > > > > > > > > Here is how the current iptables shows. > > > > > -------------------------------------------------------------------------------- > > root@r-4-VM:~# iptables -L > > Chain INPUT (policy DROP) > > target prot opt source destination > > NETWORK_STATS all -- anywhere anywhere > > ACCEPT all -- anywhere vrrp.mcast.net > > ACCEPT all -- anywhere 225.0.0.50 > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT icmp -- anywhere anywhere > > ACCEPT all -- anywhere anywhere > > ACCEPT udp -- anywhere anywhere udp > dpt:bootps > > ACCEPT udp -- anywhere anywhere udp > dpt:domain > > ACCEPT tcp -- anywhere anywhere state NEW > tcp > > dpt:3922 > > ACCEPT tcp -- anywhere anywhere state NEW > tcp > > dpt:http-alt > > ACCEPT tcp -- anywhere anywhere state NEW > tcp > > dpt:www > > > > Chain FORWARD (policy DROP) > > target prot opt source destination > > NETWORK_STATS all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere state NEW > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > ACCEPT all -- anywhere anywhere state > > RELATED,ESTABLISHED > > ACCEPT all -- anywhere anywhere > > > > Chain OUTPUT (policy ACCEPT) > > target prot opt source destination > > NETWORK_STATS all -- anywhere anywhere > > > > Chain NETWORK_STATS (3 references) > > target prot opt source destination > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > all -- anywhere anywhere > > all -- anywhere anywhere > > tcp -- anywhere anywhere > > tcp -- anywhere anywhere > > > > > > And the link have been fixed in the Git ? > > > > Thank you so much. > > > > > > On Wed, May 22, 2013 at 2:55 PM, Jayapal Reddy Uradi < > > jayapalreddy.ur...@citrix.com> wrote: > > > >> > >> I think UI link is missed but it is fixed after that. > >> Try to add rules using the API 'createEgressFirewallRule' > >> > >> Thanks, > >> Jayapal > >> > >> On 22-May-2013, at 12:05 PM, wq meng <wqm...@gmail.com> > >> wrote: > >> > >>> Hello Jayapal, > >>> > >>> > >>> > >> > https://cwiki.apache.org/CLOUDSTACK/egress-firewall-rules-for-guest-network.html > >>> > >>> I have checked Network -> Guest Network (Name) -> > >>> > >>> I can not find out any Egress fire rule tab. > >>> > >>> > >>> Have I missed something? > >>> > >>> > >>> Thank you very much. > >>> > >>> > >>> > >>> > >>> On Wed, May 22, 2013 at 1:23 PM, Jayapal Reddy Uradi < > >>> jayapalreddy.ur...@citrix.com> wrote: > >>> > >>>> Hi, > >>>> > >>>> Did you configure the egress firewall rules on the guest network ? > >>>> You need to add egress rules to allow guest traffic. > >>>> > >>>> After adding egress rule it not works, please send router iptables > >> rules. > >>>> > >>>> Thanks, > >>>> Jayapal > >>>> > >>>> On 22-May-2013, at 4:10 AM, wq meng <wqm...@gmail.com> wrote: > >>>> > >>>>> Hello > >>>>> > >>>>> Anyone have faced this problem? CS4.02 KVM Advanced Network, VM > >> instance > >>>>> can not access public IP. NAT(Source) > >>>>> > >>>>> > >>>>> That the VM instance running, but inside the VM instance, it is not > >>>>> possible to access outside. > >>>>> > >>>>> > >>>>> It can ping VMs each other, It can ping google.com in the* Virtual > >>>> Router > >>>>> VM.* > >>>>> > >>>>> But just can not ping Google.com inside the VM instance. > >>>>> > >>>>> > >>>>> Seems inside the VM instance, It can resolve the Google.com 's IP > >>>> address. > >>>>> BUT can not do others. > >>>>> > >>>>> Please see the following output. > >>>>> > >>>>> > >>>>> ------------------------ > >>>>> [root@CentOS5-5 ~]# wget www.google.com > >>>>> --2013-05-21 08:30:39-- http://www.google.com/ > >>>>> Resolving www.google.com... 173.194.64.104, 173.194.64.99, > >>>> 173.194.64.105, > >>>>> ... > >>>>> Connecting to www.google.com|173.194.64.104|:80... > >>>>> [root@CentOS5-5 ~]# ls > >>>>> > >>>>> ------------------------- > >>>>> [root@CentOS5-5 ~]# iptables -L > >>>>> Chain INPUT (policy ACCEPT) > >>>>> target prot opt source destination > >>>>> RH-Firewall-1-INPUT all -- anywhere anywhere > >>>>> > >>>>> Chain FORWARD (policy ACCEPT) > >>>>> target prot opt source destination > >>>>> RH-Firewall-1-INPUT all -- anywhere anywhere > >>>>> > >>>>> Chain OUTPUT (policy ACCEPT) > >>>>> target prot opt source destination > >>>>> > >>>>> Chain RH-Firewall-1-INPUT (2 references) > >>>>> target prot opt source destination > >>>>> ACCEPT all -- anywhere anywhere > >>>>> ACCEPT icmp -- anywhere anywhere icmp any > >>>>> ACCEPT esp -- anywhere anywhere > >>>>> ACCEPT ah -- anywhere anywhere > >>>>> ACCEPT udp -- anywhere 224.0.0.251 udp > >> dpt:mdns > >>>>> ACCEPT udp -- anywhere anywhere udp > >> dpt:ipp > >>>>> ACCEPT tcp -- anywhere anywhere tcp > >> dpt:ipp > >>>>> ACCEPT all -- anywhere anywhere state > >>>>> RELATED,ESTABLISHED > >>>>> ACCEPT tcp -- anywhere anywhere state > NEW > >>>> tcp > >>>>> dpt:ssh > >>>>> REJECT all -- anywhere anywhere > >> reject-with > >>>>> icmp-host-prohibited > >>>>> [root@CentOS5-5 ~]# ping 8.8.8.8 > >>>>> PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. > >>>>> > >>>>> --- 8.8.8.8 ping statistics --- > >>>>> 3 packets transmitted, 0 received, 100% packet loss, time 2000ms > >>>>> > >>>>> -------------------------- > >>>>> [root@CentOS5-5 ~]# ifconfig > >>>>> eth0 Link encap:Ethernet HWaddr 02:00:2D:C8:00:01 > >>>>> inet addr:10.1.1.5 Bcast:10.1.1.255 Mask:255.255.255.0 > >>>>> inet6 addr: fe80::2dff:fec8:1/64 Scope:Link > >>>>> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > >>>>> RX packets:2442 errors:0 dropped:0 overruns:0 frame:0 > >>>>> TX packets:2261 errors:0 dropped:0 overruns:0 carrier:0 > >>>>> collisions:0 txqueuelen:1000 > >>>>> RX bytes:174960 (170.8 KiB) TX bytes:154159 (150.5 KiB) > >>>>> > >>>>> lo Link encap:Local Loopback > >>>>> inet addr:127.0.0.1 Mask:255.0.0.0 > >>>>> inet6 addr: ::1/128 Scope:Host > >>>>> UP LOOPBACK RUNNING MTU:16436 Metric:1 > >>>>> RX packets:32 errors:0 dropped:0 overruns:0 frame:0 > >>>>> TX packets:32 errors:0 dropped:0 overruns:0 carrier:0 > >>>>> collisions:0 txqueuelen:0 > >>>>> RX bytes:3913 (3.8 KiB) TX bytes:3913 (3.8 KiB) > >>>>> > >>>>> ---------------------------- > >>>>> > >>>>> [root@CentOS5-5 ~]# tracert www.google.com > >>>>> traceroute to www.google.com (173.194.64.106), 30 hops max, 40 byte > >>>> packets > >>>>> 1 r-4-VM.cs2cloud.internal (10.1.1.1) 0.158 ms 0.136 ms 0.134 ms > >>>>> 2 * * * > >>>>> 3 * * * > >>>>> 4 * * * > >>>>> 5 * * * > >>>>> 6 * * * > >>>>> 7 * * * > >>>>> 8 * * * > >>>>> 9 * * * > >>>>> 10 * * * > >>>>> 11 * * * > >>>>> 12 * * * > >>>>> 13 * * * > >>>>> 14 * * * > >>>>> 15 * * * > >>>>> 16 * * * > >>>>> 17 * * * > >>>>> 18 * * * > >>>>> 19 * * * > >>>>> 20 * * * > >>>>> 21 * * * > >>>>> 22 * * * > >>>>> 23 * * * > >>>>> 24 * * * > >>>>> 25 * * * > >>>>> 26 * * * > >>>>> 27 * * * > >>>>> 28 * * * > >>>>> 29 * * * > >>>>> 30 * * * > >>>>> > >>>>> ---------------- > >>>>> > >>>>> > >>>>> Any thoughts? > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> Thank you very much. > >>>> > >>>> > >> > >> > >