Keeping Brian in the loop too On 10/16/12 4:04 PM, "Sangeetha Hariharan" <sangeetha.hariha...@citrix.com> wrote:
>Jayapal, > >I had another question regarding the UI implementation: > >In UI Changes section , following is mentioned: > >"The following changes are needed for the networks page for the external >device SRX network. > >1. Network ->Guest Network ->View IP Addresses -> <IP Address> -> >Configuration > >a. Hide the Firewall when Port forwarding is configured on IP Address." > >>> How do we prevent the case when the user creates a firewall first and >>>then he tries to create a PF/LB rule (when we use SRX/F5 inline mode) ? >>>In this case what should be the expected behavior? Do we actually >>>configure the user created firewall , PF rule and also create firewalls >>>for the PF rule (if the port used in the create firewall is different >>>from that provided in the PF rule) ? > >Thanks >Sangeetha > >-----Original Message----- >From: Sangeetha Hariharan >Sent: Tuesday, October 16, 2012 1:47 PM >To: cloudstack-dev@incubator.apache.org; Alena Prokharchyk >Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on the >SRX > >Hi Jayapal, > >Had the following questions after reviewing the FS. > > >1) "Case 4: >Firewall rule is not deleted when disable the Static NAT. >1. Acquire Ip P4. >2. Create Firewall for port 22. >3. Enable static NAT on P2 for VM2. >4. Disable static NAT. >5. Enable static NAT >7.PublicNetwork# ssh <P4> (ssh to VM1 should success)" > >In this case, step 3 , i assume should be P4. > >After Step4 , In the SRX side , we will see both the firewall rule and >static NAT being deleted. But in cloud DB we will still have the firewall >rules present. Is this correct? > >After Step5 , In the SRX side , we will see both the firewall rule and >static NAT being created back in SRX side. Is this correct? > >2) What will the behavior in the following use case where user deletes a >firewall that was created for a Static NAT rule ? > >1. Acquire Ip address. >2. Create an Static NAT rule. >3. Create Firewall rules for port 22. >4. Create Firewall rule for port 80. >5. Delete firewall rule for port 22. >6. Delete firewall rule for port 80. >7. Add firewall rule for port 22. > >After Step 5 , >In SRX , we expect the firewall rule for port 22 to be deleted. > >After Step 6 , > >In SRX , Do we expect the firewall rule for port 80 and Static NAT rule >to be deleted ? > >After Step 7 , > >In SRX , Do we expect the firewall rule for port 22 and Static NAT rule >to be created ? > >-Thanks >Sangeetha > >-----Original Message----- >From: Jayapal Reddy Uradi [mailto:jayapalreddy.ur...@citrix.com] >Sent: Tuesday, October 16, 2012 7:43 AM >To: cloudstack-dev@incubator.apache.org; Alena Prokharchyk >Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on the >SRX > >Updated the FS as per the discussion. > >https://cwiki.apache.org/confluence/display/CLOUDSTACK/Static+NAT,+Port+Fo >rwarding+and+Firewall+Implementation+on+SRX > > >Thanks, >Jayapal > >> -----Original Message----- >> From: Jayapal Reddy Uradi [mailto:jayapalreddy.ur...@citrix.com] >> Sent: Tuesday, October 16, 2012 12:44 PM >> To: Alena Prokharchyk; cloudstack-dev@incubator.apache.org >> Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on >> the SRX >> >> Please see my comments inline. >> >> -Jayapal >> >> From: Alena Prokharchyk >> Sent: Monday, October 15, 2012 10:04 PM >> To: Jayapal Reddy Uradi; cloudstack-dev@incubator.apache.org >> Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on >> the SRX >> >> >> >> From: Jayapal Reddy Uradi >> <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> >> To: Alena Prokharchyk >> <alena.prokharc...@citrix.com<mailto:alena.prokharc...@citrix.com>>, >> "cloudstack-dev@incubator.apache.org<mailto:cloudstack- >> d...@incubator.apache.org>" <cloudstack- >> d...@incubator.apache.org<mailto:cloudstack-dev@incubator.apache.org>> >> Subject: RE: StaticNAT, Portforwarding and FIrewall implemenation on >> the SRX >> >> Hi Alena, >> >> Please see my comments inline, >> >> -Jayapal >> >> -----Original Message----- >> From: Alena Prokharchyk >> Sent: Friday, October 12, 2012 10:19 PM >> To: Jayapal Reddy Uradi; cloudstack- >> d...@incubator.apache.org<mailto:cloudstack-dev@incubator.apache.org> >> Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on >> the SRX Jayapal, please see my comments inline. >> -Alena. >> On 10/11/12 11:07 PM, "Jayapal Reddy Uradi" >> <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> >> wrote: >> >Alena, >> > >> >Please find my inline comments. >> > >> >Thanks, >> >Jayapal >> > >> >Thanks, >> >Jayapal >> > >> >-----Original Message----- >> >From: Alena Prokharchyk >> >Sent: Friday, October 12, 2012 5:54 AM >> >To: >> >cloudstack-dev@incubator.apache.org<mailto:cloudstack- >> d...@incubator.apa >> >che.org>; Jayapal Reddy Uradi >> >Subject: Re: StaticNAT, Portforwarding and FIrewall implemenation on >> >the SRX >> > >> >Jayapal, I reviewed the spec. My comments: >> > >> >If firewall rules per public IP address can't be configured on the >> >SRX, and there is no way to fix it (your spec says so in "Limitation" >> >section), why do we introduce all this complexity? To me it seems >> >like we are trying to show the user that he is controlling public >> >ports on SRX, while in fact it's not true. It should work just like >> >it used to work >> >before: the Ingress traffic flow from public to guest interfaces >> >should be controlled by PF/StaticNat/LB rule; Ingress traffic to >> >public ip address is allowed always. When there is no PF/LB/StaticNat >> >rule for the Guest network port, the traffic to Guest port is >> >blocked. Once you create PF rule for publicIp >> >+ guestIp, the access to the specific port of the Guest network is >> >+ opened >> >automatically. The example below (taken from the spec): >> > >> >Example: >> > >> >1. Acquire IP P1. >> >2. Create Firewall for port 22 - port 22. >> >3. Configure the port forwarding for Public IP P1, user VM V1 4. >> >Acquire another IP P2. >> >5. Enable staticNAT on P2 for VM V1 >> > >> >//Jayapal >> >Let me change the case here and going to update in FS. >> >6.Add firewall rule for P2 for VM V1 on ports 80 7. Now In SRX, using >> >P2 user can access the VM V1 ports 22 and 80. >> Still doesn't work like the regular Firewall rule. You enabled >> Firewall for port >> 22 on P1, and for port 80 on P2 and it results in being able to access >> port 22/80 on P2? Firewall rule on one public IP should never affect >> the behavior of another public IP. That's not how Firewall rule is >>supposed to work. >> > >> >7. Now P1 and P2 both can access the VM port 22 - /// you haven't >> >created the Firewall rule for the P2, yet the access from it is >> >enabled implicitly to 22:22 port. It's very confusing. In other >> >words, the firewall rule created for P1 ip should never ever control >> >the access to >> >P2 ip address. >> > >> > >> >We need to fix the original issue - make StaticNat rules on the SRX. >> >For that we have to treat firewall rule as a static nat rule for a >> >particular port by SRX device if the static nat is enabled for this >> >public ip address in the cloudStack. In all other cases Firewall rule >> >should be just ignored. >> > >> >//Jayapal >> >I agree with ignoring firewall for port forwarding. >> >But in VR the PF rule works only after adding Firewall rule for the >> >public ports. >> It is ok to leave it the old way for the SRX. Your limitation clearly >> says that you can't control the public IP / ports on the SRX anyway. >> So lets just fix the Static nat rule; it would also leave less chance >> for regressing in PF rules functionality. >> > >> >CASE1: >> > >> >* Get Ip1. >> >* Create PF rule for IP1 and port 22 VM1. Now you can access the Vm1. >> >* Create firewall rule for Ip1. SRX should just ignore this request >> >as it will not do anything >> > >> > >> >CASE2: >> > >> >* Get IP2 >> >* Enable static nat on the IP2 and VM1. Nothing is sent to SRX just >>yet. >> >* Create firewall rule for IP2 and ports 22-23. Send enable static >> >nat for >> >IP2/VM1 and port 22-23 to the SRX device >> >* Repeat last step for each port (port range) you want to enable >> >static nat for. >> > >> >//Jayapal >> >In SRX, below issue can still exist. >> >Case3: >> >In addition to CASE1, CASE2, Create another PF rule for IP1 and port >> >80 VM1. Now you can access the Vm1 port 80. >> >Now P2 can access the port 80 without Firewall rule on Port 80. >> >Because security policy in SRX is not differentiated for Public IPs. >> You can never create the PF or LB rule for the ip address that has >> Static nat rule assigned. >> [Jayapal] >> But we can create >> - PF: P1, VM V1 and ports 22-22 >> - Static NAT: P2 VM V1, and Firewall port 80 Here P2 can access V1's >> ports 22, 80. This is specific to SRX. >> >> If it was always the case for SRX, then we just have to document it. I >> believe even with the initial design you've proposed, it would have >>been the case. >> You can't control public ports with Firewall rules. >> Please confirm. >> [Jayapal] >> This case is always with the SRX. >> >> > >> >In other words, you have to make the translation of Firewall rule of >> >the cloudStack to ConfigureStaticNat on SRX when the targeted public >> >IP address is Static nat enabled. In all other cases Firewall >> >commands should be just ignored by the SRX device. >> > >> > >> >Let me know what you think, >> >//Jayapal >> >I agree with you. >> >Current port forwarding rule have Public Port range and Private Port >> >range. >> >So port forwarding allows only the Public Ports that we added. Again >> >allowing Ports using Firewall is of no use. >> >Example: >> >Port forwarding rule: public Ports 22 and private ports 22 Here Port >> >Forwarding can allow only 22. so no need to explicitly add using >> >the firewall to allow If you donĀ¹t want to allow the ports DELETE the >> >Port Forwarding rule. >> >On top of PF adding Firewall rule to allow ports 22-80 of no use >> >because there is port forwarding rule for 23-80. >> It's allright. We can change the UI to disable Firewall rule block on >> the networking diagram (when the PF provider is SRX). So only PF/LB >> and Static nat functionality will be enabled. For opening ports for >> static nat the UI will still be using createFirewall rule calls, but >> it will not be shown to the user as "Firewall" >> > >> >-Alena. >> > >> > >> > >> > >> > >> >On 10/11/12 6:16 AM, "Jayapal Reddy Uradi" >> ><jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> >> >wrote: >> > >> >>StaticNAT, PortForwarding and Firewall current functionality in >> >>SRX is not similar to the Virtual router. >> >>This functional spec describes the what configuration possible on >> >>the SRX and also the limitation of SRX compared to the >>functionality in VR. >> >> >> >>Please find the functional spec here: >> >>https://cwiki.apache.org/confluence/display/CLOUDSTACK/Static+NAT,+P >> or >> >>t >> >>+Fo >> >>rwarding+and+Firewall+Implementation+on+SRX >> >> >> >>Please provide your comments on configuring the SRX device to get >> >>functionality similar to VR. >> >> >> >>Thanks, >> >>Jayapal >> >> >> >> >> > >> > >> > >> >