Hi (again),

I have applied the patch for hairpin Nat with vrvm but here come another
problems, CS always said "Fail to enable static NAT" each time I Nat public
IP for VM.

I also tried to upgrade to 3.0.4 and the problem hadn't gone away.

In VRVM, the hairpin Nat rule were also disappeared.

Please help! !!

Sent from my HTC©
On Sep 25, 2012 3:48 PM, "Jayapal Reddy Uradi" <
jayapalreddy.ur...@citrix.com> wrote:

>
> There is no hair pin NAT related rule in the NAT table.
> Hairpin NAT issue is fixed in 3.0.3.
>
> http://bugs.cloudstack.org/browse/CS-13500
>
> Thanks,
> Jayapal
>
> -----Original Message-----
> From: Hieu Le [mailto:hieul...@gmail.com]
> Sent: Tuesday, September 25, 2012 12:24 PM
> To: cloudstack-dev@incubator.apache.org
> Subject: Re: Problem with VM private IP
>
> Here is VR iptables rules:
>
> root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t filter Chain INPUT
> (policy DROP 124 packets, 9432 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        0     0 ACCEPT     all  --  *      *       0.0.0.0/0
>  224.0.0.18
> 2        0     0 ACCEPT     all  --  *      *       0.0.0.0/0
>  225.0.0.50
> 3       38  3648 ACCEPT     all  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 4    11168 1852K ACCEPT     all  --  eth1   *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 5        5   526 ACCEPT     all  --  eth2   *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 6      102  8520 ACCEPT     icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0
> 7        5   293 ACCEPT     all  --  lo     *       0.0.0.0/0
> 0.0.0.0/0
> 8       29  9614 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0           udp dpt:67
> 9       23  1787 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0           udp dpt:53
> 10     629 37740 ACCEPT     tcp  --  eth1   *       0.0.0.0/0
> 0.0.0.0/0           state NEW tcp dpt:3922
> 11       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0           state NEW tcp dpt:8080
> 12       0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0           state NEW tcp dpt:80
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 2        1    60 ACCEPT     all  --  eth2   eth0    0.0.0.0/0
>  10.1.1.118          state NEW
> 3        3   164 ACCEPT     all  --  eth2   eth0    0.0.0.0/0
>  10.1.1.132          state NEW
> 4       21  9986 ACCEPT     all  --  eth2   eth0    0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 5       29  1600 ACCEPT     all  --  eth0   eth2    0.0.0.0/0
> 0.0.0.0/0
>
> Chain OUTPUT (policy ACCEPT 280 packets, 48879 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
>
>
> root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t nat Chain
> PREROUTING (policy ACCEPT 143 packets, 10644 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        1    60 DNAT       all  --  eth2   *       0.0.0.0/0
>  192.168.3.120       to:10.1.1.118
> 2        3   164 DNAT       all  --  eth2   *       0.0.0.0/0
>  192.168.3.115       to:10.1.1.132
>
> Chain POSTROUTING (policy ACCEPT 4 packets, 224 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        2    96 SNAT       all  --  *      eth2    10.1.1.132
> 0.0.0.0/0           to:192.168.3.115
> 2        4   192 SNAT       all  --  *      eth2    10.1.1.118
> 0.0.0.0/0           to:192.168.3.120
> 3        2   138 SNAT       all  --  *      eth2    0.0.0.0/0
> 0.0.0.0/0           to:192.168.3.116
>
> Chain OUTPUT (policy ACCEPT 2 packets, 138 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
>
>
> root@r-17-VRDLAB:~# iptables -nL -v --line-numbers -t mangle Chain
> PREROUTING (policy ACCEPT 543 packets, 44292 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1      552  346K VPN_192.168.3.116  all  --  *      *       0.0.0.0/0
>      192.168.3.116
> 2       13  5167 FIREWALL_192.168.3.120  all  --  *      *
> 0.0.0.0/0           192.168.3.120
> 3       22  5571 FIREWALL_192.168.3.115  all  --  *      *
> 0.0.0.0/0           192.168.3.115
> 4      118  5980 FIREWALL_192.168.3.116  all  --  *      *
> 0.0.0.0/0           192.168.3.116
> 5    11705 1887K CONNMARK   all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED CONNMARK restore
> 6        1    60 MARK       all  --  eth2   *       0.0.0.0/0
>  192.168.3.120       state NEW MARK set 0x2
> 7        1    60 CONNMARK   all  --  eth2   *       0.0.0.0/0
>  192.168.3.120       state NEW CONNMARK save
> 8      124 10012 MARK       all  --  eth0   *       10.1.1.118
> 0.0.0.0/0           state NEW MARK set 0x2
> 9      124 10012 CONNMARK   all  --  eth0   *       10.1.1.118
> 0.0.0.0/0           state NEW CONNMARK save
> 10       3   164 MARK       all  --  eth2   *       0.0.0.0/0
>  192.168.3.115       state NEW MARK set 0x2
> 11       3   164 CONNMARK   all  --  eth2   *       0.0.0.0/0
>  192.168.3.115       state NEW CONNMARK save
> 12      17  1445 MARK       all  --  eth0   *       10.1.1.132
> 0.0.0.0/0           state NEW MARK set 0x2
> 13      17  1445 CONNMARK   all  --  eth0   *       10.1.1.132
> 0.0.0.0/0           state NEW CONNMARK save
>
> Chain INPUT (policy ACCEPT 514 packets, 42811 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
>
> Chain FORWARD (policy ACCEPT 54 packets, 11810 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
>
> Chain OUTPUT (policy ACCEPT 231 packets, 42784 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
>
> Chain POSTROUTING (policy ACCEPT 285 packets, 54594 bytes)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1       27  9270 CHECKSUM   udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           udp dpt:68 CHECKSUM fill
>
> Chain FIREWALL_192.168.3.115 (1 references)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1       15  5203 ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 2        0     0 RETURN     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           udp dpts:1:65535
> 3        5   248 RETURN     tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp dpts:1:65535
> 4        2   120 RETURN     icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0           icmp type 255
> 5        0     0 DROP       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
> Chain FIREWALL_192.168.3.116 (1 references)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        0     0 ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 2      118  5980 DROP       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
> Chain FIREWALL_192.168.3.120 (1 references)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1        8  4903 ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 2        2   120 RETURN     icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0           icmp type 255
> 3        3   144 RETURN     tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp dpts:1:65535
> 4        0     0 RETURN     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           udp dpts:1:65535
> 5        0     0 DROP       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
> Chain VPN_192.168.3.116 (1 references)
> num   pkts bytes target     prot opt in     out     source
> destination
> 1      434  340K ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           state RELATED,ESTABLISHED
> 2      118  5980 RETURN     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
> root@r-17-VRDLAB:~#
>
>
> On Tue, Sep 25, 2012 at 12:37 PM, Jayapal Reddy Uradi <
> jayapalreddy.ur...@citrix.com> wrote:
>
> > Debug the traffic flow ... whether the traffic sent to VR guest
> > network interface then public interface .
> > Please share the VR iptables rules.
> >
> > Thanks,
> > Jayapal
> >
> > -----Original Message-----
> > From: Hieu Le [mailto:hieul...@gmail.com]
> > Sent: Tuesday, September 25, 2012 8:42 AM
> > To: cloudstack-dev@incubator.apache.org
> > Subject: Re: Problem with VM private IP
> >
> > Yep, I have read the admin guide and setup firewall rule + enable
> > static NAT for all tested VM and still facing this problem.
> >
> > On Tue, Sep 25, 2012 at 10:01 AM, Ahmad Emneina
> > <ahmad.emne...@citrix.com
> > >wrote:
> >
> > > Have you looked at the Administration Guide[1]? See page 75 and see
> > > if that solves your connectivity issue. You still need to poke the
> > > hole in the firewal and setup a NAT rule from within cloudstack.
> > >
> > > [1]:
> > > http://download.cloud.com/releases/3.0.0/CloudStack3.0AdminGuide.pdf
> > >
> > > On 9/24/12 7:56 PM, "Hieu Le" <hieul...@gmail.com> wrote:
> > >
> > > >Hi,
> > > >
> > > >The telnet packets are not reaching the telnet server VM.
> > > >
> > > >I'm using CS 3.0.2.
> > > >
> > > >Thanks for replying !
> > > >
> > > >On Mon, Sep 24, 2012 at 5:52 PM, Jayapal Reddy Uradi <
> > > >jayapalreddy.ur...@citrix.com> wrote:
> > > >
> > > >> Using firewall and port forwarding rules only  we can access the
> > > >>VM services from the public network also from the VMs using the
> > > >>Public
> > IPs.
> > > >> For you  telnet from outside network success but from failed from
> > > >>VM to VM  using public IP.
> > > >> Seems hair pin NAT  got failed ...
> > > >>
> > > >> Please capture the packets on the telnet server VM to see whether
> > > >> telnet packets are reaching or not ?
> > > >>
> > > >> Which version of cloudstack Is it ?
> > > >>
> > > >> Thanks,
> > > >> Jayapal
> > > >>
> > > >> -----Original Message-----
> > > >> From: Hieu Le [mailto:hieul...@gmail.com]
> > > >> Sent: Monday, September 24, 2012 3:39 PM
> > > >> To: cloudstack-dev@incubator.apache.org
> > > >> Subject: Problem with VM private IP
> > > >>
> > > >> Hi everyone,
> > > >>
> > > >> I have a problem while working with VM private IP. My Cloud
> > > >>system run 2  VMs in advance zone with private IP is 10.1.1.20 and
> > > >>10.1.1.21 and VM NAT  IP is 192.168.50.160 and 192.168.50.165.
> > > >>From outside network, I can ping  and telnet port 80 to both VMs
> > > >>with public IPs. But from VM 10.1.1.21, I  can't telnet to other
> > > >>VM with its public IP.
> > > >>
> > > >> For details:
> > > >> From VM1: 10.1.1.20 and 192.168.50.160.
> > > >> ping 192.168.50.165 and ping 10.1.1.21 success telnet 10.1.1.21
> > > >>80 success  telnet 192.168.50.165 80 fail
> > > >>
> > > >> From VM2: 10.1.1.21 and 192.168.50.165 ping 192.168.50.160 and
> > > >> ping
> > > >> 10.1.1.20 success telnet 10.1.1.20 success telnet 192.168.50.160
> > > >> 80 fail
> > > >>
> > > >> And I can't telnet another ports with public IP.
> > > >>
> > > >> Can you suggest some solutions for me to telnet VM from another
> > > >> VM via public IP.
> > > >>
> > > >> Thank !
> > > >>
> > > >
> > > >
> > > >
> > > >--
> > > >..:: Hieu LE ::..
> > > >
> > > >Class: Information System - Course 52 School of Information and
> > > >Communication Technology Hanoi University of Technology No 1, Dai
> > > >Co Viet street - Hai Ba Trung district - Hanoi
> > > >
> > > >High Performance Computing Center
> > > >Cloud Computing Group
> > > >Gmail: hieul...@gmail.com
> > > >
> > >
> > >
> > > --
> > > Æ
> > >
> > >
> > >
> > >
> >
> >
> > --
> > ..:: Hieu LE ::..
> >
> > Class: Information System - Course 52
> > School of Information and Communication Technology Hanoi University of
> > Technology No 1, Dai Co Viet street - Hai Ba Trung district - Hanoi
> >
> > High Performance Computing Center
> > Cloud Computing Group
> > Gmail: hieul...@gmail.com
> >
>
>
>
> --
> ..:: Hieu LE ::..
>
> Class: Information System - Course 52
> School of Information and Communication Technology Hanoi University of
> Technology No 1, Dai Co Viet street - Hai Ba Trung district - Hanoi
>
> High Performance Computing Center
> Cloud Computing Group
> Gmail: hieul...@gmail.com
>

Reply via email to