[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] Force traffic out one interface
Hi Felix,Excellent plan! We are getting closer! I should really put all these wonderful tips from everyone here on a blog or something.. Back to the plan..The only difficulty I see here is that the DomUs will be using public IP address, and the firewall (between the Internet and Dom0) will be a "filtering bridge" in its own right. However maybe that doesn't matter. Would you maybe be able to give me some example of the actual rules that I could use? This would be very much appreciated, and if I saw the rules I could work out if my firewall setup is a problem. It would be nice if my ISP just gave my firewall's WAN interface a single address, and allowed multiple public subnets to be routed via my firewall (so my firewall would act like a router, not a bridge), however I don't think this is the case. I think all that I will get is just an ethernet cable connected to a switch.. Thanks On 13/06/10 17:10, Felix Kuperjans wrote: Hi Jonathan, I read your mail and those you posted in different previous threads and I think that you should probably consider *not* using a bridge and using pure routing instead: - Do you really need bridge-only features (especially broadcasts from domU to domU or broadcasts trespassing the dom0)? If I understand your plans correctly, you want all your domUs to be isolated with their own IP address and only communicating via a dedicated firewall. This way, you would not need broadcasts between clients (this is only interesting if you want to use LAN services between your domUs, because broadcasts are not sent across the internet anyway). - AFAIK, routing is more secure and faster than bridging, but somewhat harder to setup. - You could do what you posted below with routing. It might work with bridging, too, but I don't know a good way to do that with a bridge. With routing, you would need policy routing because of this elementary problem: You have (to make things easier to explain, in this example only 2) two DomUs (let's say, 1.0.0.1 on vif-1.0 and 1.0.0.2 on vif-2.0), the Domain-0 and a dedicated firewall between the Dom0 and the internet. If 1.0.0.1 wants to reach any server on the internet (or vice versa), it will trespass the firewall by default. But if 1.0.0.1 wants to send (e.g. an e-mail) to 1.0.0.2 or (more dangerous) wants to attack 1.0.0.2, they would only communicate via the Domain-0 (without the firewall). The problem is: If you route 1.0.0.2 to vif-2.0 under all circumstances, it will bypass the firewall if 1.0.0.1 sent the package. If you route everything except 1.0.0.1 via eth0, you wont be able to reach 1.0.0.2 any way. The solution is: You need to do policy routing. If a package originates from the internet an should be sent to 1.0.0.2, it must be routed to vif-2.0. But if it originates from 1.0.0.1, it must be routed to eth0, so that it is sent to the firewall. The firewall will then process the package and return it to the server, which now must route the package to vif-2.0. So it will take two policy routes: route 1.0.0.2 via vif-2.0, if it is from eth0 route 1.0.0.2 via eth0, if it is not from eth0 I don't think that those routes would work with a bridge, so consider using routing. Felix Am 13.06.2010 17:45, schrieb Jonathan Tripathy:Hi Everyone, Does anyone know any rules that I could use (using iptable, ebtables, or otherwise) that could force all traffic coming from a guest to go out via a particular interface? I wish to stop "inter-guest" communication, without going via my firewall first. Thanks _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users_______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |