|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-users
Re: [Xen-users] Xen 3.4.2 networking help
 
 I'm not sure what, if anything, is done by setting an IP in the DomU 
config ! I vaguely recall that there is a mechanism for a PV guest to 
get this and use it when configuring the network.
 
Correct. For the most part, it does nothing of much importance
 
 What you will need to do is configure iptables and/or ebtables (which 
I haven't personally used)  to limit what traffic is permitted from 
each DomU. Ideally you want to restrict traffic both by source IP 
address and by source MAC address - have you seen what happens when a 
device uses a MAC address that's already in use ?
The biggest issue with iptables and bridging is that you cannot 
restrict traffic which is outbound from the machine with the bridge 
(ie your Dom0) - you can restrict/control all inbound and forwarded 
traffic.
 I'm not sure what you mean by this? On my Xen nodes, I have 2 NICs. NIC1 
is connected to a public bridge (which has no IP assigned) which all the 
DomUs are connected to. I use ebtables and iptables to make sure that no 
traffic from NIC1 can get onto the INPUT chain of the Dom0. NIC2 is 
connected to a private bridge which my Dom0 has an ip assigned to it. I 
also have some private DomUs connected to this bridge.
Unfortunately, to do this will mean running iptables/ebtables scripts 
each time you start a guest and it's new VIFs are configured. I'm not 
aware of any pre-existing scripts to do this.
 I have made scripts to do this on my setup. It's very each. You have to 
create a new vif-bridge file for each DomU in /etc/xen/scripts 
(vif-bridge-x) and set the DomU config to use the respective file. Then 
in each vif-bridge-x file, comment out "handle_iptable" and call another 
script (iptables-up-x and iptables-down-x) which runs the correct 
iptables commands. You could also put the iptables calls directly in the 
vif-bridge-x file, however i keep them separate just to keep things 
neat. It also means I can call my iptables-up-x and iptables-down-x 
scripts without rebooting the DomU. I have also give each DomU an 
incoming chain and outgoing chain, meaning I can add rules easily which 
only apply to each DomU. I make heavy use of physdev.
 There is a third way, and that is to have a monitoring script that 
detects a machine using an address it's not assigned - and to shut it 
down. Having your host shut down from under you is likely to get your 
attention and teach you not to do it again !
 I'm not sure why you need to restrict IP traffic between guests. While 
it's unlikely, one guest may have need of contact with another, just 
as it will almost certainly have need of contact with other hosts on 
the internet. Unless you are running an external firewall to protect 
them all (in which case the guest-guest traffic would be unprotected), 
there's really no difference from them being separate hosts on the big 
bad internet and each should be configured with it's own firewall.
 If you use my iptables scripts idea above, you can put rules in there to 
restrict inter-DomU communication.
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 
 |   
 
 | 
    | 
  
  
    |   | 
    |