Hello Vittal,

Here is how I define the vlans.

eth1 - br0
management network  192.168.100.0/24   NO vlan

eth1.1200 - cloudVirBr1200
public network 198.105.xxx.0/24   vlan 1200

eth1.1300 - cloudVirBr1300
guest network 10.1.1.0/24  vlan 1300



I have all in one computer.  One NIC for all the 3 traffic type.


Should this be a problem?



Thank you very much.




On Thu, May 23, 2013 at 9:27 AM, Chiradeep Vittal <
chiradeep.vit...@citrix.com> wrote:

> It looks like you have defined 3 public vlans all with the same range?
>
> On 5/22/13 2:20 PM, "wq meng" <wqm...@gmail.com> wrote:
>
> >Hello jayapal,
> >
> >I have reload and reinstalled CS4.02,  Still have the problem.
> >
> >Please see the router vm, why so many ethx?
> >
> >eth0 is for guest,  eth1 is link-local,  eth2 should be the public?
> >
> >I have tried
> >
> >iptables -A FORWARD -i eth0 -o eth2 -j ACCEPT
> >
> >Still no luck.
> >
> >Any problem with my install?  I use one box for the management server and
> >also the KVM host.
> >
> >Thank you very much.
> >
> >
> >
> >root@r-4-VM:~# route -n
> >Kernel IP routing table
> >Destination     Gateway         Genmask         Flags Metric Ref    Use
> >Iface
> >198.105.191.0   0.0.0.0         255.255.255.0   U     0      0        0
> >eth2
> >198.105.191.0   0.0.0.0         255.255.255.0   U     0      0        0
> >eth3
> >198.105.191.0   0.0.0.0         255.255.255.0   U     0      0        0
> >eth4
> >10.1.1.0        0.0.0.0         255.255.255.0   U     0      0        0
> >eth0
> >169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0
> >eth1
> >0.0.0.0         198.105.191.1   0.0.0.0         UG    0      0        0
> >eth2
> >root@r-4-VM:~# ifconfig
> >eth0      Link encap:Ethernet  HWaddr 02:00:5b:79:00:02
> >          inet addr:10.1.1.1  Bcast:10.1.1.255  Mask:255.255.255.0
> >          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >          RX packets:386 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:29 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:1000
> >          RX bytes:38794 (37.8 KiB)  TX bytes:2754 (2.6 KiB)
> >
> >eth1      Link encap:Ethernet  HWaddr 0e:00:a9:fe:02:e9
> >          inet addr:169.254.2.233  Bcast:169.254.255.255  Mask:255.255.0.0
> >          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >          RX packets:2327 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:2051 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:1000
> >          RX bytes:390750 (381.5 KiB)  TX bytes:383291 (374.3 KiB)
> >
> >eth2      Link encap:Ethernet  HWaddr 06:eb:d8:00:00:2b
> >          inet addr:198.105.191.25  Bcast:198.105.191.255
> >Mask:255.255.255.0
> >          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >          RX packets:3368 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:331 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:1000
> >          RX bytes:198359 (193.7 KiB)  TX bytes:31594 (30.8 KiB)
> >
> >eth3      Link encap:Ethernet  HWaddr 06:80:0e:00:00:2b
> >          inet addr:198.105.191.25  Bcast:0.0.0.0  Mask:255.255.255.0
> >          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >          RX packets:3260 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:1000
> >          RX bytes:179843 (175.6 KiB)  TX bytes:84 (84.0 B)
> >
> >eth4      Link encap:Ethernet  HWaddr 06:b8:9a:00:00:2b
> >          inet addr:198.105.191.25  Bcast:0.0.0.0  Mask:255.255.255.0
> >          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >          RX packets:3255 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:1000
> >          RX bytes:179567 (175.3 KiB)  TX bytes:84 (84.0 B)
> >
> >lo        Link encap:Local Loopback
> >          inet addr:127.0.0.1  Mask:255.0.0.0
> >          UP LOOPBACK RUNNING  MTU:16436  Metric:1
> >          RX packets:6 errors:0 dropped:0 overruns:0 frame:0
> >          TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
> >          collisions:0 txqueuelen:0
> >          RX bytes:414 (414.0 B)  TX bytes:414 (414.0 B)
> >
> >root@r-4-VM:~# iptables -L
> >Chain INPUT (policy DROP)
> >target     prot opt source               destination
> >NETWORK_STATS  all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             vrrp.mcast.net
> >ACCEPT     all  --  anywhere             225.0.0.50
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     icmp --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     udp  --  anywhere             anywhere            udp
> >dpt:bootps
> >ACCEPT     udp  --  anywhere             anywhere            udp
> >dpt:domain
> >ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp
> >dpt:3922
> >ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp
> >dpt:http-alt
> >ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp
> >dpt:www
> >
> >Chain FORWARD (policy DROP)
> >target     prot opt source               destination
> >NETWORK_STATS  all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere            state NEW
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere            state
> >RELATED,ESTABLISHED
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere
> >ACCEPT     all  --  anywhere             anywhere
> >
> >Chain OUTPUT (policy ACCEPT)
> >target     prot opt source               destination
> >NETWORK_STATS  all  --  anywhere             anywhere
> >
> >Chain NETWORK_STATS (3 references)
> >target     prot opt source               destination
> >           all  --  anywhere             anywhere
> >           all  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >           all  --  anywhere             anywhere
> >           all  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >           all  --  anywhere             anywhere
> >           all  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >           tcp  --  anywhere             anywhere
> >
> >
> >On Wed, May 22, 2013 at 6:41 PM, Jayapal Reddy Uradi <
> >jayapalreddy.ur...@citrix.com> wrote:
> >
> >> In your CS version egress rules feature is not present.
> >> Thats the reason CS says Unknown API.
> >> I checked your iptables rules also, egress rules default block rules are
> >> not present.
> >> You can ignore the egress firewall rules.
> >>
> >> check the in your router is there  rule to accept guest traffic to
> >>public.
> >> If not add below iptables rule on router. This rules make allowing guest
> >> traffic to public network.
> >>
> >> iptables -A FORWARD  -i <guest interface name> -o <public interface
> >>name>
> >> -j ACCEPT
> >>
> >>
> >> Thanks,
> >> jayapal
> >> On 22-May-2013, at 4:03 PM, wq meng <wqm...@gmail.com>
> >>  wrote:
> >>
> >> > Hello Jayapal
> >> >
> >> > If CS4.02 default is block the VM to access public side,  and on the
> >>UC ,
> >> > there is no link to change it.  As you saw, the  API have no API
> >>Names to
> >> > change it too.
> >> >
> >> >
> >> > How to fix the problem?
> >> >
> >> >
> >> >
> >> >
> >> > I will reload the OS and re-setup CS4.02 again to check if it will
> >>fix.
> >> >
> >> >
> >> >
> >> > Thank you so much.
> >> >
> >> >
> >> >
> >> > On Wed, May 22, 2013 at 6:23 PM, Jayapal Reddy Uradi <
> >> > jayapalreddy.ur...@citrix.com> wrote:
> >> >
> >> >> From VM if you are not able to ping public side then it is your setup
> >> >> issue.
> >> >> It can be debugged by capturing packets on the router guest interface
> >> and
> >> >> public interface to see wether the packets are reaching to router or
> >>not
> >> >>
> >> >> Thanks,
> >> >> Jayapal
> >> >>
> >> >> On 22-May-2013, at 3:49 PM, Jayapal Reddy Uradi <
> >> >> jayapalreddy.ur...@citrix.com>
> >> >> wrote:
> >> >>
> >> >>>
> >> >>> You need pining router VM public IP from public network/subnet ?
> >> >>> - You need to add icmp firewall rule on the public IP to enable ping
> >> >> request on the public ip
> >> >>>
> >> >>> Thanks,
> >> >>> Jayapal
> >> >>>
> >> >>>
> >> >>> On 22-May-2013, at 3:45 PM, wq meng <wqm...@gmail.com>
> >> >>> wrote:
> >> >>>
> >> >>>> Hello Jayapal
> >> >>>>
> >> >>>> There is no problem to ping Google from the Router VM, Only
> >>problem is
> >> >> that
> >> >>>> I can not ping the Router VM public IP from outside.
> >> >>>>
> >> >>>> root@r-4-VM:~# ping www.google.com
> >> >>>> PING www.google.com (173.194.64.147): 56 data bytes
> >> >>>> 64 bytes from 173.194.64.147: icmp_seq=0 ttl=48 time=53.194 ms
> >> >>>> 64 bytes from 173.194.64.147: icmp_seq=1 ttl=48 time=53.190 ms
> >> >>>> 64 bytes from 173.194.64.147: icmp_seq=2 ttl=48 time=53.286 ms
> >> >>>> 64 bytes from 173.194.64.147: icmp_seq=3 ttl=48 time=53.207 ms
> >> >>>> ^C--- www.google.com ping statistics ---
> >> >>>> 4 packets transmitted, 4 packets received, 0% packet loss
> >> >>>> round-trip min/avg/max/stddev = 53.190/53.219/53.286/0.039 ms
> >> >>>>
> >> >>>> root@r-4-VM:~# iptables -L -nv
> >> >>>> Chain INPUT (policy DROP 583 packets, 18656 bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 7009 1074K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     all  --  *      *       0.0.0.0/0
> >> >>>> 224.0.0.18
> >> >>>>  0     0 ACCEPT     all  --  *      *       0.0.0.0/0
> >> >>>> 225.0.0.50
> >> >>>>  0     0 ACCEPT     all  --  eth0   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>> 5619 1007K ACCEPT     all  --  eth1   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>> 24  2906 ACCEPT     all  --  eth2   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>> 57  4825 ACCEPT     icmp --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  5   293 ACCEPT     all  --  lo     *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           udp dpt:67
> >> >>>> 349 24753 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           udp dpt:53
> >> >>>> 318 19080 ACCEPT     tcp  --  eth1   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state NEW tcp dpt:3922
> >> >>>>  0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state NEW tcp dpt:8080
> >> >>>>  0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state NEW tcp dpt:80
> >> >>>>
> >> >>>> Chain FORWARD (policy DROP 0 packets, 0 bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 8735 1159K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>> 4746  775K ACCEPT     all  --  eth0   eth2    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>> 3657  364K ACCEPT     all  --  eth2   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state NEW
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth3   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth3    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 10.1.1.5            state RELATED,ESTABLISHED /*
> 198.105.191.245:22
> >> :22
> >> >> */
> >> >>>> 332 19920 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 10.1.1.5            tcp dpt:22 state NEW /* 198.105.191.245:22:22
> >>*/
> >> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 10.1.1.5            state RELATED,ESTABLISHED /*
> 198.105.191.245:80
> >> :80
> >> >> */
> >> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 10.1.1.5            tcp dpt:80 state NEW /* 198.105.191.245:80:80
> >>*/
> >> >>>>  0     0 ACCEPT     all  --  eth4   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth4    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     all  --  eth5   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth5    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     all  --  eth6   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth6    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     all  --  eth7   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>>  0     0 ACCEPT     all  --  eth0   eth7    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>
> >> >>>> Chain OUTPUT (policy ACCEPT 704 packets, 122K bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 6195 1039K NETWORK_STATS  all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>
> >> >>>> Chain NETWORK_STATS (3 references)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 4746  775K            all  --  eth0   eth2    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>> 3989  384K            all  --  eth2   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth2    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  2   100            tcp  --  eth2   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth0   eth3    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth3   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth3    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  eth3   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth0   eth4    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth4   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth4    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  eth4   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth0   eth5    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth5   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth5    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  eth5   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth0   eth6    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth6   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth6    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  eth6   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth0   eth7    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            all  --  eth7   eth0    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  !eth0  eth7    0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0            tcp  --  eth7   !eth0   0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>> root@r-4-VM:~#
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>
> >>
> >>-------------------------------------------------------------------------
> >>-----------
> >> >>>> Below is from the Guest VM instance.
> >> >>>>
> >> >>>> Not sure how to capture the package .
> >> >>>>
> >> >>>> But I do a tracepath  www.google.com inside the guest VM.
> >> >>>>
> >> >>>> From the output,
> >> >>>>
> >> >>>> [root@CentOS5-5 ~]# tracepath www.google.com
> >> >>>> 1:  r-4-VM.cs2cloud.internal (10.1.1.1)                    0.149ms
> >> >>>> 2:  no reply
> >> >>>> 3:  no reply
> >> >>>> 4:  no reply
> >> >>>>
> >> >>>> [root@CentOS5-5 ~]# iptables -L -nv
> >> >>>> Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 15198 1412K RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>
> >> >>>> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>>  0     0 RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>
> >> >>>> Chain OUTPUT (policy ACCEPT 17238 packets, 7377K bytes)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>>
> >> >>>> Chain RH-Firewall-1-INPUT (2 references)
> >> >>>> pkts bytes target     prot opt in     out     source
> >> >>>> destination
> >> >>>> 56  9116 ACCEPT     all  --  lo     *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>> 22  3360 ACCEPT     icmp --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           icmp type 255
> >> >>>>  0     0 ACCEPT     esp  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>>  0     0 ACCEPT     ah   --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0
> >> >>>> 13  2124 ACCEPT     udp  --  *      *       0.0.0.0/0
> >> >>>> 224.0.0.251         udp dpt:5353
> >> >>>>  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           udp dpt:631
> >> >>>>  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           tcp dpt:631
> >> >>>> 13536 1320K ACCEPT     all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state RELATED,ESTABLISHED
> >> >>>> 931 55796 ACCEPT     tcp  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           state NEW tcp dpt:22
> >> >>>> 640 21690 REJECT     all  --  *      *       0.0.0.0/0
> >> >>>> 0.0.0.0/0           reject-with icmp-host-prohibited
> >> >>>>
> >> >>>>
> >> >>>> Inside the VM, Can ping other VMs' guest IP.
> >> >>>>
> >> >>>>
> >> >>>> [root@CentOS5-5 ~]# ping 10.1.1.36
> >> >>>> PING 10.1.1.36 (10.1.1.36) 56(84) bytes of data.
> >> >>>> 64 bytes from 10.1.1.36: icmp_seq=1 ttl=64 time=1.32 ms
> >> >>>> 64 bytes from 10.1.1.36: icmp_seq=2 ttl=64 time=0.156 ms
> >> >>>> 64 bytes from 10.1.1.36: icmp_seq=3 ttl=64 time=0.134 ms
> >> >>>>
> >> >>>> --- 10.1.1.36 ping statistics ---
> >> >>>> 3 packets transmitted, 3 received, 0% packet loss, time 2000ms
> >> >>>> rtt min/avg/max/mdev = 0.134/0.538/1.326/0.557 ms
> >> >>>> [root@CentOS5-5 ~]# ifconfig
> >> >>>> eth0      Link encap:Ethernet  HWaddr 02:00:2D:C8:00:01
> >> >>>>        inet addr:10.1.1.5  Bcast:10.1.1.255  Mask:255.255.255.0
> >> >>>>        inet6 addr: fe80::2dff:fec8:1/64 Scope:Link
> >> >>>>        UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >> >>>>        RX packets:16846 errors:0 dropped:0 overruns:0 frame:0
> >> >>>>        TX packets:18252 errors:0 dropped:0 overruns:0 carrier:0
> >> >>>>        collisions:0 txqueuelen:1000
> >> >>>>        RX bytes:1716037 (1.6 MiB)  TX bytes:7661658 (7.3 MiB)
> >> >>>>
> >> >>>> lo        Link encap:Local Loopback
> >> >>>>        inet addr:127.0.0.1  Mask:255.0.0.0
> >> >>>>        inet6 addr: ::1/128 Scope:Host
> >> >>>>        UP LOOPBACK RUNNING  MTU:16436  Metric:1
> >> >>>>        RX packets:56 errors:0 dropped:0 overruns:0 frame:0
> >> >>>>        TX packets:56 errors:0 dropped:0 overruns:0 carrier:0
> >> >>>>        collisions:0 txqueuelen:0
> >> >>>>        RX bytes:9116 (8.9 KiB)  TX bytes:9116 (8.9 KiB)
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>>> [root@CentOS5-5 ~]# ping www.google.com
> >> >>>> PING www.google.com (173.194.64.104) 56(84) bytes of data.
> >> >>>> ^C
> >> >>>> --- www.google.com ping statistics ---
> >> >>>> 6 packets transmitted, 0 received, 100% packet loss, time 5000ms
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>>> Any problems?
> >> >>>>
> >> >>>> Thank you so much.
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>>> On Wed, May 22, 2013 at 4:14 PM, Jayapal Reddy Uradi <
> >> >>>> jayapalreddy.ur...@citrix.com> wrote:
> >> >>>>
> >> >>>>> By looking at the iptables rules, there is no egress rules
> >>feature in
> >> >> your
> >> >>>>> deployment.
> >> >>>>> In your case the issue seems to be different.
> >> >>>>>
> >> >>>>> Please do the below trouble shooting.
> >> >>>>> Ping from the guest vm to public subnet/google and try to capture
> >>the
> >> >>>>> packets on the router guest interface and public interface.
> >> >>>>> Check wether the packets are reaching to public interface of VR or
> >> not.
> >> >>>>>
> >> >>>>> Also send iptables -L -nv output.
> >> >>>>>
> >> >>>>> Thanks,
> >> >>>>> Jayapal
> >> >>>>>
> >> >>>>> On 22-May-2013, at 1:18 PM, wq meng <wqm...@gmail.com>
> >> >>>>> wrote:
> >> >>>>>
> >> >>>>>> Hello Jayapal
> >> >>>>>>
> >> >>>>>> I know very little about api yet.
> >> >>>>>>
> >> >>>>>> I login to the VRouter VM, Can I change the rules to get work?
> >> >>>>>>
> >> >>>>>> On
> >> >>>>>>
> >> >>>>>
> >> >>
> >>
> >>
> https://cwiki.apache.org/confluence/display/CLOUDSTACK/Egress+firewall+ru
> >>les+for+guest+network
> >> >>>>>>
> >> >>>>>> It says some Chains , but I can not find them inside my VRouter
> >>VM.
> >> >>>>>>
> >> >>>>>> ====================
> >> >>>>>>
> >> >>>>>> firewallRule_egress.sh script get called on the virtual router.
> >> >>>>>>
> >> >>>>>> The egress rules are added in filter table table, FW_EGRESS_RULES
> >> >> chain.
> >> >>>>>>
> >> >>>>>> All the traffic from eth0 eth2 (public interface) will be send to
> >> the
> >> >>>>>> FW_OUTBOUND  chain.
> >> >>>>>>
> >> >>>>>> *iptables rules:*
> >> >>>>>>
> >> >>>>>> *Default rules:*
> >> >>>>>>
> >> >>>>>> ipassoc.sh adding rule to ACCEPT traffic from eth0 to public
> >> >> interface.
> >> >>>>>>
> >> >>>>>> Modified the rule to send egress traffic to the FW_OUTBOUND
> >>chain.
> >> >>>>>>
> >> >>>>>> *iptables -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND*
> >> >>>>>>
> >> >>>>>> *Rules added while configuring:*
> >> >>>>>>
> >> >>>>>> Ex: Egress rule  to block the port 22 (ssh) traffic from
> >> 10.1.1.31/32
> >> >>>>>>
> >> >>>>>> *iptables -A  **FW_OUTBOUND **-j EGRESS_FWRULES*
> >> >>>>>>
> >> >>>>>> *iptables -A EGRESS_FWRULES   -s   10.1.1.31/32 -p tcp  --dport
> >> 22:22
> >> >>>>> -j
> >> >>>>>> ACCEPT*
> >> >>>>>> ======================
> >> >>>>>>
> >> >>>>>>
> >> >>>>>>
> >> >>>>>>
> >> >>>>>>
> >> >>>>>> Here is how the current iptables shows.
> >> >>>>>>
> >> >>>>>>
> >> >>>>>
> >> >>
> >>
> >>-------------------------------------------------------------------------
> >>-------
> >> >>>>>> root@r-4-VM:~# iptables -L
> >> >>>>>> Chain INPUT (policy DROP)
> >> >>>>>> target     prot opt source               destination
> >> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             vrrp.mcast.net
> >> >>>>>> ACCEPT     all  --  anywhere             225.0.0.50
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     icmp --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     udp  --  anywhere             anywhere            udp
> >> >>>>> dpt:bootps
> >> >>>>>> ACCEPT     udp  --  anywhere             anywhere            udp
> >> >>>>> dpt:domain
> >> >>>>>> ACCEPT     tcp  --  anywhere             anywhere
> >>state
> >> NEW
> >> >>>>> tcp
> >> >>>>>> dpt:3922
> >> >>>>>> ACCEPT     tcp  --  anywhere             anywhere
> >>state
> >> NEW
> >> >>>>> tcp
> >> >>>>>> dpt:http-alt
> >> >>>>>> ACCEPT     tcp  --  anywhere             anywhere
> >>state
> >> NEW
> >> >>>>> tcp
> >> >>>>>> dpt:www
> >> >>>>>>
> >> >>>>>> Chain FORWARD (policy DROP)
> >> >>>>>> target     prot opt source               destination
> >> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> NEW
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >>state
> >> >>>>>> RELATED,ESTABLISHED
> >> >>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>>
> >> >>>>>> Chain OUTPUT (policy ACCEPT)
> >> >>>>>> target     prot opt source               destination
> >> >>>>>> NETWORK_STATS  all  --  anywhere             anywhere
> >> >>>>>>
> >> >>>>>> Chain NETWORK_STATS (3 references)
> >> >>>>>> target     prot opt source               destination
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        all  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>        tcp  --  anywhere             anywhere
> >> >>>>>>
> >> >>>>>>
> >> >>>>>> And the link have been fixed in the Git ?
> >> >>>>>>
> >> >>>>>> Thank you so much.
> >> >>>>>>
> >> >>>>>>
> >> >>>>>> On Wed, May 22, 2013 at 2:55 PM, Jayapal Reddy Uradi <
> >> >>>>>> jayapalreddy.ur...@citrix.com> wrote:
> >> >>>>>>
> >> >>>>>>>
> >> >>>>>>> I think UI link is missed but it is fixed after that.
> >> >>>>>>> Try to add rules using the API 'createEgressFirewallRule'
> >> >>>>>>>
> >> >>>>>>> Thanks,
> >> >>>>>>> Jayapal
> >> >>>>>>>
> >> >>>>>>> On 22-May-2013, at 12:05 PM, wq meng <wqm...@gmail.com>
> >> >>>>>>> wrote:
> >> >>>>>>>
> >> >>>>>>>> Hello Jayapal,
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>
> >> >>>>>
> >> >>
> >>
> >>
> https://cwiki.apache.org/CLOUDSTACK/egress-firewall-rules-for-guest-netwo
> >>rk.html
> >> >>>>>>>>
> >> >>>>>>>> I have checked  Network  ->  Guest Network (Name) ->
> >> >>>>>>>>
> >> >>>>>>>> I can not find out any  Egress fire rule tab.
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>> Have I missed something?
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>> Thank you very much.
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>> On Wed, May 22, 2013 at 1:23 PM, Jayapal Reddy Uradi <
> >> >>>>>>>> jayapalreddy.ur...@citrix.com> wrote:
> >> >>>>>>>>
> >> >>>>>>>>> Hi,
> >> >>>>>>>>>
> >> >>>>>>>>> Did you configure the egress firewall rules on the guest
> >>network
> >> ?
> >> >>>>>>>>> You need to add egress rules to allow guest traffic.
> >> >>>>>>>>>
> >> >>>>>>>>> After adding egress rule it not works, please send router
> >> iptables
> >> >>>>>>> rules.
> >> >>>>>>>>>
> >> >>>>>>>>> Thanks,
> >> >>>>>>>>> Jayapal
> >> >>>>>>>>>
> >> >>>>>>>>> On 22-May-2013, at 4:10 AM, wq meng <wqm...@gmail.com> wrote:
> >> >>>>>>>>>
> >> >>>>>>>>>> Hello
> >> >>>>>>>>>>
> >> >>>>>>>>>> Anyone have faced this problem?  CS4.02 KVM Advanced
> >>Network, VM
> >> >>>>>>> instance
> >> >>>>>>>>>> can not access public IP.  NAT(Source)
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> That the VM instance running, but inside the VM instance, it
> >>is
> >> >> not
> >> >>>>>>>>>> possible to access outside.
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> It can ping VMs each other,   It can ping google.com in the*
> >> >> Virtual
> >> >>>>>>>>> Router
> >> >>>>>>>>>> VM.*
> >> >>>>>>>>>>
> >> >>>>>>>>>> But just can not ping Google.com inside the VM instance.
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> Seems inside the VM instance,  It can resolve the Google.com
> >>'s
> >> IP
> >> >>>>>>>>> address.
> >> >>>>>>>>>> BUT can not do others.
> >> >>>>>>>>>>
> >> >>>>>>>>>> Please see the following output.
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> ------------------------
> >> >>>>>>>>>> [root@CentOS5-5 ~]# wget www.google.com
> >> >>>>>>>>>> --2013-05-21 08:30:39--  http://www.google.com/
> >> >>>>>>>>>> Resolving www.google.com... 173.194.64.104, 173.194.64.99,
> >> >>>>>>>>> 173.194.64.105,
> >> >>>>>>>>>> ...
> >> >>>>>>>>>> Connecting to www.google.com|173.194.64.104|:80...
> >> >>>>>>>>>> [root@CentOS5-5 ~]# ls
> >> >>>>>>>>>>
> >> >>>>>>>>>> -------------------------
> >> >>>>>>>>>> [root@CentOS5-5 ~]# iptables -L
> >> >>>>>>>>>> Chain INPUT (policy ACCEPT)
> >> >>>>>>>>>> target     prot opt source               destination
> >> >>>>>>>>>> RH-Firewall-1-INPUT  all  --  anywhere             anywhere
> >> >>>>>>>>>>
> >> >>>>>>>>>> Chain FORWARD (policy ACCEPT)
> >> >>>>>>>>>> target     prot opt source               destination
> >> >>>>>>>>>> RH-Firewall-1-INPUT  all  --  anywhere             anywhere
> >> >>>>>>>>>>
> >> >>>>>>>>>> Chain OUTPUT (policy ACCEPT)
> >> >>>>>>>>>> target     prot opt source               destination
> >> >>>>>>>>>>
> >> >>>>>>>>>> Chain RH-Firewall-1-INPUT (2 references)
> >> >>>>>>>>>> target     prot opt source               destination
> >> >>>>>>>>>> ACCEPT     all  --  anywhere             anywhere
> >> >>>>>>>>>> ACCEPT     icmp --  anywhere             anywhere
> >>  icmp
> >> >> any
> >> >>>>>>>>>> ACCEPT     esp  --  anywhere             anywhere
> >> >>>>>>>>>> ACCEPT     ah   --  anywhere             anywhere
> >> >>>>>>>>>> ACCEPT     udp  --  anywhere             224.0.0.251
> >>udp
> >> >>>>>>> dpt:mdns
> >> >>>>>>>>>> ACCEPT     udp  --  anywhere             anywhere
> >>udp
> >> >>>>>>> dpt:ipp
> >> >>>>>>>>>> ACCEPT     tcp  --  anywhere             anywhere
> >>tcp
> >> >>>>>>> dpt:ipp
> >> >>>>>>>>>> ACCEPT     all  --  anywhere             anywhere
> >>  state
> >> >>>>>>>>>> RELATED,ESTABLISHED
> >> >>>>>>>>>> ACCEPT     tcp  --  anywhere             anywhere
> >>  state
> >> >>>>> NEW
> >> >>>>>>>>> tcp
> >> >>>>>>>>>> dpt:ssh
> >> >>>>>>>>>> REJECT     all  --  anywhere             anywhere
> >> >>>>>>> reject-with
> >> >>>>>>>>>> icmp-host-prohibited
> >> >>>>>>>>>> [root@CentOS5-5 ~]# ping 8.8.8.8
> >> >>>>>>>>>> PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
> >> >>>>>>>>>>
> >> >>>>>>>>>> --- 8.8.8.8 ping statistics ---
> >> >>>>>>>>>> 3 packets transmitted, 0 received, 100% packet loss, time
> >>2000ms
> >> >>>>>>>>>>
> >> >>>>>>>>>> --------------------------
> >> >>>>>>>>>> [root@CentOS5-5 ~]# ifconfig
> >> >>>>>>>>>> eth0      Link encap:Ethernet  HWaddr 02:00:2D:C8:00:01
> >> >>>>>>>>>>     inet addr:10.1.1.5  Bcast:10.1.1.255  Mask:255.255.255.0
> >> >>>>>>>>>>     inet6 addr: fe80::2dff:fec8:1/64 Scope:Link
> >> >>>>>>>>>>     UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> >> >>>>>>>>>>     RX packets:2442 errors:0 dropped:0 overruns:0 frame:0
> >> >>>>>>>>>>     TX packets:2261 errors:0 dropped:0 overruns:0 carrier:0
> >> >>>>>>>>>>     collisions:0 txqueuelen:1000
> >> >>>>>>>>>>     RX bytes:174960 (170.8 KiB)  TX bytes:154159 (150.5 KiB)
> >> >>>>>>>>>>
> >> >>>>>>>>>> lo        Link encap:Local Loopback
> >> >>>>>>>>>>     inet addr:127.0.0.1  Mask:255.0.0.0
> >> >>>>>>>>>>     inet6 addr: ::1/128 Scope:Host
> >> >>>>>>>>>>     UP LOOPBACK RUNNING  MTU:16436  Metric:1
> >> >>>>>>>>>>     RX packets:32 errors:0 dropped:0 overruns:0 frame:0
> >> >>>>>>>>>>     TX packets:32 errors:0 dropped:0 overruns:0 carrier:0
> >> >>>>>>>>>>     collisions:0 txqueuelen:0
> >> >>>>>>>>>>     RX bytes:3913 (3.8 KiB)  TX bytes:3913 (3.8 KiB)
> >> >>>>>>>>>>
> >> >>>>>>>>>> ----------------------------
> >> >>>>>>>>>>
> >> >>>>>>>>>> [root@CentOS5-5 ~]# tracert www.google.com
> >> >>>>>>>>>> traceroute to www.google.com (173.194.64.106), 30 hops max,
> >>40
> >> >> byte
> >> >>>>>>>>> packets
> >> >>>>>>>>>> 1  r-4-VM.cs2cloud.internal (10.1.1.1)  0.158 ms  0.136 ms
> >>  0.134
> >> >> ms
> >> >>>>>>>>>> 2  * * *
> >> >>>>>>>>>> 3  * * *
> >> >>>>>>>>>> 4  * * *
> >> >>>>>>>>>> 5  * * *
> >> >>>>>>>>>> 6  * * *
> >> >>>>>>>>>> 7  * * *
> >> >>>>>>>>>> 8  * * *
> >> >>>>>>>>>> 9  * * *
> >> >>>>>>>>>> 10  * * *
> >> >>>>>>>>>> 11  * * *
> >> >>>>>>>>>> 12  * * *
> >> >>>>>>>>>> 13  * * *
> >> >>>>>>>>>> 14  * * *
> >> >>>>>>>>>> 15  * * *
> >> >>>>>>>>>> 16  * * *
> >> >>>>>>>>>> 17  * * *
> >> >>>>>>>>>> 18  * * *
> >> >>>>>>>>>> 19  * * *
> >> >>>>>>>>>> 20  * * *
> >> >>>>>>>>>> 21  * * *
> >> >>>>>>>>>> 22  * * *
> >> >>>>>>>>>> 23  * * *
> >> >>>>>>>>>> 24  * * *
> >> >>>>>>>>>> 25  * * *
> >> >>>>>>>>>> 26  * * *
> >> >>>>>>>>>> 27  * * *
> >> >>>>>>>>>> 28  * * *
> >> >>>>>>>>>> 29  * * *
> >> >>>>>>>>>> 30  * * *
> >> >>>>>>>>>>
> >> >>>>>>>>>> ----------------
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> Any thoughts?
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>> Thank you very much.
> >> >>>>>>>>>
> >> >>>>>>>>>
> >> >>>>>>>
> >> >>>>>>>
> >> >>>>>
> >> >>>>>
> >> >>>
> >> >>
> >> >>
> >>
> >>
>
>

Reply via email to