sadhu suresh created CLOUDSTACK-99: -------------------------------------- Summary: disable staticNat deletes the firewall rule Key: CLOUDSTACK-99 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-99 Project: CloudStack Issue Type: Bug Components: Network Controller Environment: Git Revision: 03df2fa9dd45c938f72cd1866044b09d1b0cc978 Git URL: https://git-wip-us.apache.org/repos/asf/incubator-cloudstack.gi
Reporter: sadhu suresh Fix For: pre-4.0.0 Steps: 1.create advance Zone with hyper-visor as xen 2.deploy a vm 3.acquire public IP and configure firewall rule for port 22 4.enable static NAT 5.disable static NAT 6.observe the behavior actual result: disable static NAT was successful but it deletes firewall rule also. earlier in 2.2.x when we define any service the corresponding firewall rule will be created and when we delete the policy(pF/staticnat) the corresponding firewall rule will be deleted from background But in 3.0x firewall is separated from services/polices like(PF/StaticNat) we need to explicitly define firewall to these policies/services. Expected result: should not delete the firewall rule when we disable the staticnat rule.if the customer wants to use the same public IP for other other services like PF then he has to define firwall rule again to open the port 22 to ssh. if its working as per design then it needs to be documented clearly. efore disabling the firewall root@r-11-VM:~# iptables -L -t mangle Chain PREROUTING (policy ACCEPT) target prot opt source destination VPN_10.147.49.33 all -- anywhere 10.147.49.33 FIREWALL_10.147.49.24 all -- anywhere 10.147.49.24 FIREWALL_10.147.49.33 all -- anywhere 10.147.49.33 CONNMARK all -- anywhere anywhere state RELATED,ESTABLISHED CONNMARK restore MARK all -- anywhere 10.147.49.24 state NEW MARK set 0x2 CONNMARK all -- anywhere 10.147.49.24 state NEW CONNMARK save MARK all -- 8d1a831e-0eb3-46d8-8347-c7920e1e7cd2 anywhere state NEW MARK set 0x2 CONNMARK all -- 8d1a831e-0eb3-46d8-8347-c7920e1e7cd2 anywhere state NEW CONNMARK save Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination CHECKSUM udp -- anywhere anywhere udp dpt:bootpc CHECKSUM fill Chain FIREWALL_10.147.49.24 (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED RETURN tcp -- anywhere anywhere tcp dpt:ssh DROP all -- anywhere anywhere Chain FIREWALL_10.147.49.33 (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DROP all -- anywhere anywhere after disableing the staticNAT: root@r-11-VM:~# iptables -L -t mangle Chain PREROUTING (policy ACCEPT) target prot opt source destination VPN_10.147.49.33 all -- anywhere 10.147.49.33 FIREWALL_10.147.49.33 all -- anywhere 10.147.49.33 CONNMARK all -- anywhere anywhere state RELATED,ESTABLISHED CONNMARK restore Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination CHECKSUM udp -- anywhere anywhere udp dpt:bootpc CHECKSUM fill Chain FIREWALL_10.147.49.33 (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED DROP all -- anywhere anywhere Chain VPN_10.147.49.33 (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED RETURN all -- anywhere anywhere -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira