Hello jayapal,

I downloaded the lastest 4.02 source code.  is the 4.02 removed the egress ?



I will try the iptables trick .

Thank you so much.


On Wed, May 22, 2013 at 6:41 PM, Jayapal Reddy Uradi <
jayapalreddy.ur...@citrix.com> wrote:

> In your CS version egress rules feature is not present.
> Thats the reason CS says Unknown API.
> I checked your iptables rules also, egress rules default block rules are
> not present.
> You can ignore the egress firewall rules.
>
> check the in your router is there  rule to accept guest traffic to public.
> If not add below iptables rule on router. This rules make allowing guest
> traffic to public network.
>
> iptables -A FORWARD  -i <guest interface name> -o <public interface name>
> -j ACCEPT
>
>
> Thanks,
> jayapal
> On 22-May-2013, at 4:03 PM, wq meng <wqm...@gmail.com>
>  wrote:
>
> > Hello Jayapal
> >
> > If CS4.02 default is block the VM to access public side,  and on the UC ,
> > there is no link to change it.  As you saw, the  API have no API Names to
> > change it too.
> >
> >
> > How to fix the problem?
> >
> >
> >
> >
> > I will reload the OS and re-setup CS4.02 again to check if it will fix.
> >
> >
> >
> > Thank you so much.
> >
> >
> >
> > On Wed, May 22, 2013 at 6:23 PM, Jayapal Reddy Uradi <
> > jayapalreddy.ur...@citrix.com> wrote:
> >
> >> From VM if you are not able to ping public side then it is your setup
> >> issue.
> >> It can be debugged by capturing packets on the router guest interface
> and
> >> public interface to see wether the packets are reaching to router or not
> >>
> >> Thanks,
> >> Jayapal
> >>
> >> On 22-May-2013, at 3:49 PM, Jayapal Reddy Uradi <
> >> jayapalreddy.ur...@citrix.com>
> >> wrote:
> >>
> >>>
> >>> You need pining router VM public IP from public network/subnet ?
> >>> - You need to add icmp firewall rule on the public IP to enable ping
> >> request on the public ip
> >>>
> >>> Thanks,
> >>> Jayapal
> >>>
> >>>
> >>> On 22-May-2013, at 3:45 PM, wq meng <wqm...@gmail.com>
> >>> wrote:
> >>>
> >>>> Hello Jayapal
> >>>>
> >>>> There is no problem to ping Google from the Router VM, Only problem is
> >> that
> >>>> I can not ping the Router VM public IP from outside.
> >>>>
> >>>> root@r-4-VM:~# ping www.google.com
> >>>> PING www.google.com (173.194.64.147): 56 data bytes
> >>>> 64 bytes from 173.194.64.147: icmp_seq=0 ttl=48 time=53.194 ms
> >>>> 64 bytes from 173.194.64.147: icmp_seq=1 ttl=48 time=53.190 ms
> >>>> 64 bytes from 173.194.64.147: icmp_seq=2 ttl=48 time=53.286 ms
> >>>> 64 bytes from 173.194.64.147: icmp_seq=3 ttl=48 time=53.207 ms
> >>>> ^C--- www.google.com ping statistics ---
> >>>> 4 packets transmitted, 4 packets received, 0% packet loss
> >>>> round-trip min/avg/max/stddev = 53.190/53.219/53.286/0.039 ms
> >>>>
> >>>> root@r-4-VM:~# iptables -L -nv
> >>>> Chain INPUT (policy DROP 583 packets, 18656 bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 7009 1074K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     all  --  *      *       0.0.0.0/0
> >>>> 224.0.0.18
> >>>>  0     0 ACCEPT     all  --  *      *       0.0.0.0/0
> >>>> 225.0.0.50
> >>>>  0     0 ACCEPT     all  --  eth0   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>> 5619 1007K ACCEPT     all  --  eth1   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>> 24  2906 ACCEPT     all  --  eth2   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>> 57  4825 ACCEPT     icmp --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  5   293 ACCEPT     all  --  lo     *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> >>>> 0.0.0.0/0           udp dpt:67
> >>>> 349 24753 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> >>>> 0.0.0.0/0           udp dpt:53
> >>>> 318 19080 ACCEPT     tcp  --  eth1   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state NEW tcp dpt:3922
> >>>>  0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state NEW tcp dpt:8080
> >>>>  0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> >>>> 0.0.0.0/0           state NEW tcp dpt:80
> >>>>
> >>>> Chain FORWARD (policy DROP 0 packets, 0 bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 8735 1159K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>> 4746  775K ACCEPT     all  --  eth0   eth2    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>> 3657  364K ACCEPT     all  --  eth2   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state NEW
> >>>>  0     0 ACCEPT     all  --  eth0   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth3   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth3    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 10.1.1.5            state RELATED,ESTABLISHED /* 198.105.191.245:22
> :22
> >> */
> >>>> 332 19920 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 10.1.1.5            tcp dpt:22 state NEW /* 198.105.191.245:22:22 */
> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 10.1.1.5            state RELATED,ESTABLISHED /* 198.105.191.245:80
> :80
> >> */
> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 10.1.1.5            tcp dpt:80 state NEW /* 198.105.191.245:80:80 */
> >>>>  0     0 ACCEPT     all  --  eth4   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth4    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     all  --  eth5   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth5    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     all  --  eth6   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth6    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     all  --  eth7   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>>  0     0 ACCEPT     all  --  eth0   eth7    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>
> >>>> Chain OUTPUT (policy ACCEPT 704 packets, 122K bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 6195 1039K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>
> >>>> Chain NETWORK_STATS (3 references)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 4746  775K            all  --  eth0   eth2    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>> 3989  384K            all  --  eth2   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth2    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  2   100            tcp  --  eth2   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth0   eth3    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth3   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth3    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  eth3   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth0   eth4    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth4   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth4    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  eth4   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth0   eth5    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth5   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth5    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  eth5   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth0   eth6    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth6   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth6    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  eth6   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth0   eth7    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            all  --  eth7   eth0    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  !eth0  eth7    0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0            tcp  --  eth7   !eth0   0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>> root@r-4-VM:~#
> >>>>
> >>>>
> >>>>
> >>>>
> >>
> ------------------------------------------------------------------------------------
> >>>> Below is from the Guest VM instance.
> >>>>
> >>>> Not sure how to capture the package .
> >>>>
> >>>> But I do a tracepath  www.google.com inside the guest VM.
> >>>>
> >>>> From the output,
> >>>>
> >>>> [root@CentOS5-5 ~]# tracepath www.google.com
> >>>> 1:  r-4-VM.cs2cloud.internal (10.1.1.1)                    0.149ms
> >>>> 2:  no reply
> >>>> 3:  no reply
> >>>> 4:  no reply
> >>>>
> >>>> [root@CentOS5-5 ~]# iptables -L -nv
> >>>> Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 15198 1412K RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>
> >>>> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>>  0     0 RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>
> >>>> Chain OUTPUT (policy ACCEPT 17238 packets, 7377K bytes)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>>
> >>>> Chain RH-Firewall-1-INPUT (2 references)
> >>>> pkts bytes target     prot opt in     out     source
> >>>> destination
> >>>> 56  9116 ACCEPT     all  --  lo     *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>> 22  3360 ACCEPT     icmp --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           icmp type 255
> >>>>  0     0 ACCEPT     esp  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>>  0     0 ACCEPT     ah   --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0
> >>>> 13  2124 ACCEPT     udp  --  *      *       0.0.0.0/0
> >>>> 224.0.0.251         udp dpt:5353
> >>>>  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           udp dpt:631
> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           tcp dpt:631
> >>>> 13536 1320K ACCEPT     all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >>>> 931 55796 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           state NEW tcp dpt:22
> >>>> 640 21690 REJECT     all  --  *      *       0.0.0.0/0
> >>>> 0.0.0.0/0           reject-with icmp-host-prohibited
> >>>>
> >>>>
> >>>> Inside the VM, Can ping other VMs' guest IP.
> >>>>
> >>>>
> >>>> [root@CentOS5-5 ~]# ping 10.1.1.36
> >>>> PING 10.1.1.36 (10.1.1.36) 56(84) bytes of data.
> >>>> 64 bytes from 10.1.1.36: icmp_seq=1 ttl=64 time=1.32 ms
> >>>> 64 bytes from 10.1.1.36: icmp_seq=2 ttl=64 time=0.156 ms
> >>>> 64 bytes from 10.1.1.36: icmp_seq=3 ttl=64 time=0.134 ms
> >>>>
> >>>> --- 10.1.1.36 ping statistics ---
> >>>> 3 packets transmitted, 3 received, 0% packet loss, time 2000ms
> >>>> rtt min/avg/max/mdev = 0.134/0.538/1.326/0.557 ms
> >>>> [root@CentOS5-5 ~]# ifconfig
> >>>> eth0      Link encap:Ethernet  HWaddr 02:00:2D:C8:00:01
> >>>>        inet addr:10.1.1.5  Bcast:10.1.1.255  Mask:255.255.255.0
> >>>>        inet6 addr: fe80::2dff:fec8:1/64 Scope:Link
> >>>>        UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >>>>        RX packets:16846 errors:0 dropped:0 overruns:0 frame:0
> >>>>        TX packets:18252 errors:0 dropped:0 overruns:0 carrier:0
> >>>>        collisions:0 txqueuelen:1000
> >>>>        RX bytes:1716037 (1.6 MiB)  TX bytes:7661658 (7.3 MiB)
> >>>>
> >>>> lo        Link encap:Local Loopback
> >>>>        inet addr:127.0.0.1  Mask:255.0.0.0
> >>>>        inet6 addr: ::1/128 Scope:Host
> >>>>        UP LOOPBACK RUNNING  MTU:16436  Metric:1
> >>>>        RX packets:56 errors:0 dropped:0 overruns:0 frame:0
> >>>>        TX packets:56 errors:0 dropped:0 overruns:0 carrier:0
> >>>>        collisions:0 txqueuelen:0
> >>>>        RX bytes:9116 (8.9 KiB)  TX bytes:9116 (8.9 KiB)
> >>>>
> >>>>
> >>>>
> >>>> [root@CentOS5-5 ~]# ping www.google.com
> >>>> PING www.google.com (173.194.64.104) 56(84) bytes of data.
> >>>> ^C
> >>>> --- www.google.com ping statistics ---
> >>>> 6 packets transmitted, 0 received, 100% packet loss, time 5000ms
> >>>>
> >>>>
> >>>>
> >>>> Any problems?
> >>>>
> >>>> Thank you so much.
> >>>>
> >>>>
> >>>>
> >>>> On Wed, May 22, 2013 at 4:14 PM, Jayapal Reddy Uradi <
> >>>> jayapalreddy.ur...@citrix.com> wrote:
> >>>>
> >>>>> By looking at the iptables rules, there is no egress rules feature in
> >> your
> >>>>> deployment.
> >>>>> In your case the issue seems to be different.
> >>>>>
> >>>>> Please do the below trouble shooting.
> >>>>> Ping from the guest vm to public subnet/google and try to capture the
> >>>>> packets on the router guest interface and public interface.
> >>>>> Check wether the packets are reaching to public interface of VR or
> not.
> >>>>>
> >>>>> Also send iptables -L -nv output.
> >>>>>
> >>>>> Thanks,
> >>>>> Jayapal
> >>>>>
> >>>>> On 22-May-2013, at 1:18 PM, wq meng <wqm...@gmail.com>
> >>>>> wrote:
> >>>>>
> >>>>>> Hello Jayapal
> >>>>>>
> >>>>>> I know very little about api yet.
> >>>>>>
> >>>>>> I login to the VRouter VM, Can I change the rules to get work?
> >>>>>>
> >>>>>> On
> >>>>>>
> >>>>>
> >>
> https://cwiki.apache.org/confluence/display/CLOUDSTACK/Egress+firewall+rules+for+guest+network
> >>>>>>
> >>>>>> It says some Chains , but I can not find them inside my VRouter VM.
> >>>>>>
> >>>>>> ====================
> >>>>>>
> >>>>>> firewallRule_egress.sh script get called on the virtual router.
> >>>>>>
> >>>>>> The egress rules are added in filter table table, FW_EGRESS_RULES
> >> chain.
> >>>>>>
> >>>>>> All the traffic from eth0 eth2 (public interface) will be send to
> the
> >>>>>> FW_OUTBOUND  chain.
> >>>>>>
> >>>>>> *iptables rules:*
> >>>>>>
> >>>>>> *Default rules:*
> >>>>>>
> >>>>>> ipassoc.sh adding rule to ACCEPT traffic from eth0 to public
> >> interface.
> >>>>>>
> >>>>>> Modified the rule to send egress traffic to the FW_OUTBOUND chain.
> >>>>>>
> >>>>>> *iptables -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND*
> >>>>>>
> >>>>>> *Rules added while configuring:*
> >>>>>>
> >>>>>> Ex: Egress rule  to block the port 22 (ssh) traffic from
> 10.1.1.31/32
> >>>>>>
> >>>>>> *iptables -A  **FW_OUTBOUND **-j EGRESS_FWRULES*
> >>>>>>
> >>>>>> *iptables -A EGRESS_FWRULES   -s   10.1.1.31/32 -p tcp  --dport
> 22:22
> >>>>> -j
> >>>>>> ACCEPT*
> >>>>>> ======================
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> Here is how the current iptables shows.
> >>>>>>
> >>>>>>
> >>>>>
> >>
> --------------------------------------------------------------------------------
> >>>>>> root@r-4-VM:~# iptables -L
> >>>>>> Chain INPUT (policy DROP)
> >>>>>> target     prot opt source               destination
> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             vrrp.mcast.net
> >>>>>> ACCEPT     all  --  anywhere             225.0.0.50
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     icmp --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     udp  --  anywhere             anywhere            udp
> >>>>> dpt:bootps
> >>>>>> ACCEPT     udp  --  anywhere             anywhere            udp
> >>>>> dpt:domain
> >>>>>> ACCEPT     tcp  --  anywhere             anywhere            state
> NEW
> >>>>> tcp
> >>>>>> dpt:3922
> >>>>>> ACCEPT     tcp  --  anywhere             anywhere            state
> NEW
> >>>>> tcp
> >>>>>> dpt:http-alt
> >>>>>> ACCEPT     tcp  --  anywhere             anywhere            state
> NEW
> >>>>> tcp
> >>>>>> dpt:www
> >>>>>>
> >>>>>> Chain FORWARD (policy DROP)
> >>>>>> target     prot opt source               destination
> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> NEW
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>> ACCEPT     all  --  anywhere             anywhere            state
> >>>>>> RELATED,ESTABLISHED
> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>>
> >>>>>> Chain OUTPUT (policy ACCEPT)
> >>>>>> target     prot opt source               destination
> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >>>>>>
> >>>>>> Chain NETWORK_STATS (3 references)
> >>>>>> target     prot opt source               destination
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        all  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>        tcp  --  anywhere             anywhere
> >>>>>>
> >>>>>>
> >>>>>> And the link have been fixed in the Git ?
> >>>>>>
> >>>>>> Thank you so much.
> >>>>>>
> >>>>>>
> >>>>>> On Wed, May 22, 2013 at 2:55 PM, Jayapal Reddy Uradi <
> >>>>>> jayapalreddy.ur...@citrix.com> wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> I think UI link is missed but it is fixed after that.
> >>>>>>> Try to add rules using the API 'createEgressFirewallRule'
> >>>>>>>
> >>>>>>> Thanks,
> >>>>>>> Jayapal
> >>>>>>>
> >>>>>>> On 22-May-2013, at 12:05 PM, wq meng <wqm...@gmail.com>
> >>>>>>> wrote:
> >>>>>>>
> >>>>>>>> Hello Jayapal,
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>
> >>
> https://cwiki.apache.org/CLOUDSTACK/egress-firewall-rules-for-guest-network.html
> >>>>>>>>
> >>>>>>>> I have checked  Network  ->  Guest Network (Name) ->
> >>>>>>>>
> >>>>>>>> I can not find out any  Egress fire rule tab.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Have I missed something?
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Thank you very much.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> On Wed, May 22, 2013 at 1:23 PM, Jayapal Reddy Uradi <
> >>>>>>>> jayapalreddy.ur...@citrix.com> wrote:
> >>>>>>>>
> >>>>>>>>> Hi,
> >>>>>>>>>
> >>>>>>>>> Did you configure the egress firewall rules on the guest network
> ?
> >>>>>>>>> You need to add egress rules to allow guest traffic.
> >>>>>>>>>
> >>>>>>>>> After adding egress rule it not works, please send router
> iptables
> >>>>>>> rules.
> >>>>>>>>>
> >>>>>>>>> Thanks,
> >>>>>>>>> Jayapal
> >>>>>>>>>
> >>>>>>>>> On 22-May-2013, at 4:10 AM, wq meng <wqm...@gmail.com> wrote:
> >>>>>>>>>
> >>>>>>>>>> Hello
> >>>>>>>>>>
> >>>>>>>>>> Anyone have faced this problem?  CS4.02 KVM Advanced Network, VM
> >>>>>>> instance
> >>>>>>>>>> can not access public IP.  NAT(Source)
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> That the VM instance running, but inside the VM instance, it is
> >> not
> >>>>>>>>>> possible to access outside.
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> It can ping VMs each other,   It can ping google.com in the*
> >> Virtual
> >>>>>>>>> Router
> >>>>>>>>>> VM.*
> >>>>>>>>>>
> >>>>>>>>>> But just can not ping Google.com inside the VM instance.
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> Seems inside the VM instance,  It can resolve the Google.com 's
> IP
> >>>>>>>>> address.
> >>>>>>>>>> BUT can not do others.
> >>>>>>>>>>
> >>>>>>>>>> Please see the following output.
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> ------------------------
> >>>>>>>>>> [root@CentOS5-5 ~]# wget www.google.com
> >>>>>>>>>> --2013-05-21 08:30:39--  http://www.google.com/
> >>>>>>>>>> Resolving www.google.com... 173.194.64.104, 173.194.64.99,
> >>>>>>>>> 173.194.64.105,
> >>>>>>>>>> ...
> >>>>>>>>>> Connecting to www.google.com|173.194.64.104|:80...
> >>>>>>>>>> [root@CentOS5-5 ~]# ls
> >>>>>>>>>>
> >>>>>>>>>> -------------------------
> >>>>>>>>>> [root@CentOS5-5 ~]# iptables -L
> >>>>>>>>>> Chain INPUT (policy ACCEPT)
> >>>>>>>>>> target     prot opt source               destination
> >>>>>>>>>> RH-Firewall-1-INPUT  all  --  anywhere             anywhere
> >>>>>>>>>>
> >>>>>>>>>> Chain FORWARD (policy ACCEPT)
> >>>>>>>>>> target     prot opt source               destination
> >>>>>>>>>> RH-Firewall-1-INPUT  all  --  anywhere             anywhere
> >>>>>>>>>>
> >>>>>>>>>> Chain OUTPUT (policy ACCEPT)
> >>>>>>>>>> target     prot opt source               destination
> >>>>>>>>>>
> >>>>>>>>>> Chain RH-Firewall-1-INPUT (2 references)
> >>>>>>>>>> target     prot opt source               destination
> >>>>>>>>>> ACCEPT     all  --  anywhere             anywhere
> >>>>>>>>>> ACCEPT     icmp --  anywhere             anywhere
>  icmp
> >> any
> >>>>>>>>>> ACCEPT     esp  --  anywhere             anywhere
> >>>>>>>>>> ACCEPT     ah   --  anywhere             anywhere
> >>>>>>>>>> ACCEPT     udp  --  anywhere             224.0.0.251         udp
> >>>>>>> dpt:mdns
> >>>>>>>>>> ACCEPT     udp  --  anywhere             anywhere            udp
> >>>>>>> dpt:ipp
> >>>>>>>>>> ACCEPT     tcp  --  anywhere             anywhere            tcp
> >>>>>>> dpt:ipp
> >>>>>>>>>> ACCEPT     all  --  anywhere             anywhere
>  state
> >>>>>>>>>> RELATED,ESTABLISHED
> >>>>>>>>>> ACCEPT     tcp  --  anywhere             anywhere
>  state
> >>>>> NEW
> >>>>>>>>> tcp
> >>>>>>>>>> dpt:ssh
> >>>>>>>>>> REJECT     all  --  anywhere             anywhere
> >>>>>>> reject-with
> >>>>>>>>>> icmp-host-prohibited
> >>>>>>>>>> [root@CentOS5-5 ~]# ping 8.8.8.8
> >>>>>>>>>> PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
> >>>>>>>>>>
> >>>>>>>>>> --- 8.8.8.8 ping statistics ---
> >>>>>>>>>> 3 packets transmitted, 0 received, 100% packet loss, time 2000ms
> >>>>>>>>>>
> >>>>>>>>>> --------------------------
> >>>>>>>>>> [root@CentOS5-5 ~]# ifconfig
> >>>>>>>>>> eth0      Link encap:Ethernet  HWaddr 02:00:2D:C8:00:01
> >>>>>>>>>>     inet addr:10.1.1.5  Bcast:10.1.1.255  Mask:255.255.255.0
> >>>>>>>>>>     inet6 addr: fe80::2dff:fec8:1/64 Scope:Link
> >>>>>>>>>>     UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >>>>>>>>>>     RX packets:2442 errors:0 dropped:0 overruns:0 frame:0
> >>>>>>>>>>     TX packets:2261 errors:0 dropped:0 overruns:0 carrier:0
> >>>>>>>>>>     collisions:0 txqueuelen:1000
> >>>>>>>>>>     RX bytes:174960 (170.8 KiB)  TX bytes:154159 (150.5 KiB)
> >>>>>>>>>>
> >>>>>>>>>> lo        Link encap:Local Loopback
> >>>>>>>>>>     inet addr:127.0.0.1  Mask:255.0.0.0
> >>>>>>>>>>     inet6 addr: ::1/128 Scope:Host
> >>>>>>>>>>     UP LOOPBACK RUNNING  MTU:16436  Metric:1
> >>>>>>>>>>     RX packets:32 errors:0 dropped:0 overruns:0 frame:0
> >>>>>>>>>>     TX packets:32 errors:0 dropped:0 overruns:0 carrier:0
> >>>>>>>>>>     collisions:0 txqueuelen:0
> >>>>>>>>>>     RX bytes:3913 (3.8 KiB)  TX bytes:3913 (3.8 KiB)
> >>>>>>>>>>
> >>>>>>>>>> ----------------------------
> >>>>>>>>>>
> >>>>>>>>>> [root@CentOS5-5 ~]# tracert www.google.com
> >>>>>>>>>> traceroute to www.google.com (173.194.64.106), 30 hops max, 40
> >> byte
> >>>>>>>>> packets
> >>>>>>>>>> 1  r-4-VM.cs2cloud.internal (10.1.1.1)  0.158 ms  0.136 ms
>  0.134
> >> ms
> >>>>>>>>>> 2  * * *
> >>>>>>>>>> 3  * * *
> >>>>>>>>>> 4  * * *
> >>>>>>>>>> 5  * * *
> >>>>>>>>>> 6  * * *
> >>>>>>>>>> 7  * * *
> >>>>>>>>>> 8  * * *
> >>>>>>>>>> 9  * * *
> >>>>>>>>>> 10  * * *
> >>>>>>>>>> 11  * * *
> >>>>>>>>>> 12  * * *
> >>>>>>>>>> 13  * * *
> >>>>>>>>>> 14  * * *
> >>>>>>>>>> 15  * * *
> >>>>>>>>>> 16  * * *
> >>>>>>>>>> 17  * * *
> >>>>>>>>>> 18  * * *
> >>>>>>>>>> 19  * * *
> >>>>>>>>>> 20  * * *
> >>>>>>>>>> 21  * * *
> >>>>>>>>>> 22  * * *
> >>>>>>>>>> 23  * * *
> >>>>>>>>>> 24  * * *
> >>>>>>>>>> 25  * * *
> >>>>>>>>>> 26  * * *
> >>>>>>>>>> 27  * * *
> >>>>>>>>>> 28  * * *
> >>>>>>>>>> 29  * * *
> >>>>>>>>>> 30  * * *
> >>>>>>>>>>
> >>>>>>>>>> ----------------
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> Any thoughts?
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>> Thank you very much.
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>
> >>>>>
> >>>
> >>
> >>
>
>

Reply via email to