|
|
|
|
|
|
|
|
|
|
xen-users
[Xen-users] Re: iptables, firewall into Dom0
Sébastien Cramatte wrote :
I've setup Xen using vlan. I've different bridge per vlan
Each VM have it's own iptables script
I've got various type of VM : http, ldap, mysql, nagios, ...
My question is how can I protect the Dom0 without block all the traffic
from DomU ...
I require restrictive rules with at least these :
INPUT:
ssh (tcp)
snmp (udp)
snmptrap (udp)
ping (icmp)
OUTPUT
http (tcp)
ssh (tcp)
dns (udp)
Regards
Hello Sébastien,
i had the same problem for protecting dom0 with iptables without
blocking domU's traffic. I think it's due to the bridging method wich
includes dom0 and domU's network interfaces into the bridge, so the
physical interface (peth0) is used for dom0 traffic and domU's traffic
into the bridge.
Here's some "tips" :
1) using ebtables or 'physdev' module of iptables, like said in some
posts in the mailing list. But my tries with phydev just allow or block
all kind of traffic, i failed separating dom0's traffic from domU's traffic.
2) if you have 2 NIC, you can assign eth0 to dom0 and assign eth1 to Xen
bridge(s) for the domU's (one bridge per vlan). eth0 is device to the
default gateway for incoming/outgoing traffic . I did this for a Xeon
server with 2 Gbit NIC and it works fine, i could protect dom0 with
iptables.
Perhaps (not yet tested), if you've only one nic, you could use eth0 for
dom0 and a dummy NIC for the Xen bridge(s).
3) I also tested routing method (in only one vlan at present but i plan
to test routing method with several vlans), it works well and i can
protect dom0 with iptables. to let routing method work, you'll have to
set ip_forwarding in dom0 and you also have to do proxy_arp in dom0 for
the domU's dor returned packets destinated to domU's
1) replace in xen-config.sxp
(network-script network-route)
(vif script vif-route)
- network-route juste enable ip_forwarding in dom0
# cat /proc/sys/net/ipv4/ip_forward
1
- vif-route create a vif<domU#id>.0 in dom0 and associate it with eth0
of domU and it creates a static route between dom0 to domU via
vif<domU#id>.0
to let traffic coming from the default gateway to a domU, set proxy_arp
into dom0, because the gw doesn't know domU's mac addresses
# sysctl -w net.ipv4.conf.eth0.proxy_arp=1
or
# echo "1" > /proc/sys/net/ipv4/conf/eth0/proxy_arp
traffic for the dom0 goes into INPUT chain and traffic for domU's goes
into FORWARD chain. If your default policy is ACCEPT for FORWARD chain
it will work (of course, you'll have to use local iptables in each domU)
But like you i'am still interested in some iptables samples config with
physdev module for protecting dom0 with bridging method without
filtering domU's traffic. If anybody have this, it would be fine....
If i said "some stupid things" in this reply, please don't hesitate to
correct.
Some usefuls threads that helps me :
http://lists.xensource.com/archives/html/xen-users/2005-04/msg00268.html
http://lists.xensource.com/archives/html/xen-users/2006-02/msg00030.html
--
Arnaud
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-users] Re: iptables, firewall into Dom0,
Arnaud JAYET <=
|
|
|
|
|