sadhu suresh created CLOUDSTACK-99:
--------------------------------------

             Summary: disable staticNat deletes the firewall rule
                 Key: CLOUDSTACK-99
                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-99
             Project: CloudStack
          Issue Type: Bug
          Components: Network Controller
         Environment: Git Revision: 03df2fa9dd45c938f72cd1866044b09d1b0cc978
Git URL: https://git-wip-us.apache.org/repos/asf/incubator-cloudstack.gi

            Reporter: sadhu suresh
             Fix For: pre-4.0.0



Steps:

1.create advance Zone with hyper-visor as xen
2.deploy a vm 
3.acquire public IP  and configure firewall rule for port 22
4.enable static NAT 
5.disable static NAT
6.observe the behavior

actual result:
disable static NAT was successful but it deletes firewall rule also.

earlier in 2.2.x when we define any service the corresponding firewall rule 
will be created and when we delete the policy(pF/staticnat) the corresponding 
firewall rule will be deleted from background


But in 3.0x firewall is separated from services/polices like(PF/StaticNat) we 
need to explicitly define firewall to these policies/services.









Expected result:
should not delete the firewall rule when we disable the staticnat rule.if the 
customer wants to use the same public IP for other other services like PF then 
he has to define firwall rule again to open the port 22 to ssh.


if its working as per design then it needs to be documented clearly.



efore disabling the firewall




root@r-11-VM:~# iptables -L -t mangle
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination
VPN_10.147.49.33  all  --  anywhere             10.147.49.33
FIREWALL_10.147.49.24  all  --  anywhere             10.147.49.24
FIREWALL_10.147.49.33  all  --  anywhere             10.147.49.33
CONNMARK   all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED CONNMARK restore
MARK       all  --  anywhere             10.147.49.24        state NEW MARK set 
0x2
CONNMARK   all  --  anywhere             10.147.49.24        state NEW CONNMARK 
save
MARK       all  --  8d1a831e-0eb3-46d8-8347-c7920e1e7cd2  anywhere            
state NEW MARK set 0x2
CONNMARK   all  --  8d1a831e-0eb3-46d8-8347-c7920e1e7cd2  anywhere            
state NEW CONNMARK save

Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
CHECKSUM   udp  --  anywhere             anywhere            udp dpt:bootpc 
CHECKSUM fill

Chain FIREWALL_10.147.49.24 (1 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED
RETURN     tcp  --  anywhere             anywhere            tcp dpt:ssh
DROP       all  --  anywhere             anywhere

Chain FIREWALL_10.147.49.33 (1 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED
DROP       all  --  anywhere             anywhere






after disableing the staticNAT:



root@r-11-VM:~# iptables -L -t mangle
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination
VPN_10.147.49.33  all  --  anywhere             10.147.49.33
FIREWALL_10.147.49.33  all  --  anywhere             10.147.49.33
CONNMARK   all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED CONNMARK restore

Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
CHECKSUM   udp  --  anywhere             anywhere            udp dpt:bootpc 
CHECKSUM fill

Chain FIREWALL_10.147.49.33 (1 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED
DROP       all  --  anywhere             anywhere

Chain VPN_10.147.49.33 (1 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state 
RELATED,ESTABLISHED
RETURN     all  --  anywhere             anywhere





--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to